[Kernel-packages] [Bug 1239459] Re: 1814:3290 [Asus X200CA] wifi doesn't connect or disconnects after few seconds

2022-10-04 Thread million ck
download latest software 2023
https://millioncrack.com/anytrans-v8-9-2-crack/
https://zcracked.com/fontcreator-crack/
https://canarydata.io/vmix-crack-registration-key/

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1239459

Title:
  1814:3290 [Asus X200CA] wifi doesn't connect or disconnects after few
  seconds

Status in Linux:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released

Bug description:
  With the new 3.11.0-12-generic kernel, wifi has problems to connect with many 
errors like these:
  Oct 13 23:50:03 ubuntotto kernel: [ 1186.580726] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 0 failed to flush
  Oct 13 23:50:03 ubuntotto kernel: [ 1186.740659] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 2 failed to flush
  Oct 13 23:50:04 ubuntotto kernel: [ 1186.900544] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 0 failed to flush
  Oct 13 23:50:04 ubuntotto kernel: [ 1187.060571] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 2 failed to flush
  Oct 13 23:50:04 ubuntotto kernel: [ 1187.096576] ieee80211 phy0: 
rt2x00queue_write_tx_frame: Error - Dropping frame due to full tx queue 0
  Oct 13 23:50:05 ubuntotto kernel: [ 1188.280106] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 0 failed to flush
  Oct 13 23:50:05 ubuntotto kernel: [ 1188.440128] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 2 failed to flush
  Oct 13 23:51:06 ubuntotto kernel: [ 1249.560697] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 0 failed to flush
  Oct 13 23:51:06 ubuntotto kernel: [ 1249.720644] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 2 failed to flush
  Oct 13 23:51:07 ubuntotto kernel: [ 1249.880590] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 0 failed to flush
  Oct 13 23:51:07 ubuntotto kernel: [ 1250.040543] ieee80211 phy0: 
rt2x00queue_flush_queue: Warning - Queue 2 failed to flush

  ProblemType: Bug
  DistroRelease: Ubuntu 13.10
  Package: linux-image-3.11.0-12-generic 3.11.0-12.19
  ProcVersionSignature: Ubuntu 3.11.0-12.19-generic 3.11.3
  Uname: Linux 3.11.0-12-generic x86_64
  ApportVersion: 2.12.5-0ubuntu2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  andrea 1791 F pulseaudio
  Date: Sun Oct 13 23:45:04 2013
  HibernationDevice: RESUME=UUID=297ef090-5420-41f6-8439-f1254f3e9e15
  InstallationDate: Installed on 2013-10-12 (1 days ago)
  InstallationMedia: Ubuntu 13.04 "Raring Ringtail" - Release amd64 (20130424)
  MachineType: ASUSTeK COMPUTER INC. X200CA
  MarkForUpload: True
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.11.0-12-generic 
root=UUID=088f2a7d-b78f-4bdd-a184-754b70a3184a ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-3.11.0-12-generic N/A
   linux-backports-modules-3.11.0-12-generic  N/A
   linux-firmware 1.116
  SourcePackage: linux
  UpgradeStatus: Upgraded to saucy on 2013-10-13 (0 days ago)
  dmi.bios.date: 09/18/2013
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: X200CA.208
  dmi.board.asset.tag: ATN12345678901234567
  dmi.board.name: X200CA
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: 1.0
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: ASUSTeK COMPUTER INC.
  dmi.chassis.version: 1.0
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrX200CA.208:bd09/18/2013:svnASUSTeKCOMPUTERINC.:pnX200CA:pvr1.0:rvnASUSTeKCOMPUTERINC.:rnX200CA:rvr1.0:cvnASUSTeKCOMPUTERINC.:ct10:cvr1.0:
  dmi.product.name: X200CA
  dmi.product.version: 1.0
  dmi.sys.vendor: ASUSTeK COMPUTER INC.

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/1239459/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1842320] Re: Can't boot: "error: out of memory." immediately after the grub menu

2022-10-04 Thread Julian Andres Klode
OK the patch set here is broken, we gotta do this from scratch properly.
So I'm going to start cherry picking the rhboot patches for memory
management. I have applied so far from bug 1989446 the backport of "Try
to pick better locations for kernel and initrd" and cherry-picked from
rhboot the "x86-efi: Use bounce buffers for reading to addresses > 4GB"
patch and will continue picking up the memory changes from the rhboot
branch and then we can address any gaps remaining.

Now the problem with the patch set is clearly that the rhboot patches
miss half their content and are applied after a custom patch that
changes most of the memory management, which does not help.

0129 I thought was "Try to pick better locations for kernel and initrd"
but it's something custom that's deep into the memory management code
and just looks like it. I thought only increasing the memory limit in
the last patch was the custom bit. I do not want to change general
memory allocation in grub vs our upstreams. Scary.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1842320

Title:
  Can't boot: "error: out of memory." immediately after the grub menu

Status in grub:
  Unknown
Status in OEM Priority Project:
  Triaged
Status in grub2-signed package in Ubuntu:
  Triaged
Status in initramfs-tools package in Ubuntu:
  Won't Fix
Status in linux package in Ubuntu:
  Confirmed

Bug description:
  [Impact]

   * In some cases, if the users’ initramfs grow bigger, then it’ll
  likely not be able to be loaded by grub2.

   * Some real cases from OEM projects:

  In many built-in 4k monitor laptops with nvidia drivers, the u-d-c
  puts the nvidia*.ko to initramfs which grows the initramfs to ~120M.
  Also the gfxpayload=auto will remain to use 4K resolution since it’s
  what EFI POST passed.

  In this case, the grub isn't able to load initramfs because the
  grub_memalign() won't be able to get suitable memory for the larger
  file:

  ```
  #0 grub_memalign (align=1, size=592214020) at ../../../grub-core/kern/mm.c:376
  #1 0x7dd7b074 in grub_malloc (size=592214020) at 
../../../grub-core/kern/mm.c:408
  #2 0x7dd7a2c8 in grub_verifiers_open (io=0x7bc02d80, type=131076)
  at ../../../grub-core/kern/verifiers.c:150
  #3 0x7dd801d4 in grub_file_open (name=0x7bc02f00 
"/boot/initrd.img-5.17.0-1011-oem",
  type=131076) at ../../../grub-core/kern/file.c:121
  #4 0x7bcd5a30 in ?? ()
  #5 0x7fe21247 in ?? ()
  #6 0x7bc030c8 in ?? ()
  #7 0x00017fe21238 in ?? ()
  #8 0x7bcd5320 in ?? ()
  #9 0x7fe21250 in ?? ()
  #10 0x in ?? ()
  ```

  Based on grub_mm_dump, we can see the memory fragment (some parts seem
  likely be used because of 4K resolution?) and doesn’t have available
  contiguous memory for larger file as:

  ```
  grub_real_malloc(...)
  ...
  if (cur->size >= n + extra)
  ```

  Based on UEFI Specification Section 7.2[1] and UEFI driver writers’
  guide 4.2.3[2], we can ask 32bits+ on AllocatePages().

  As most X86_64 platforms should support 64 bits addressing, we should
  extend GRUB_EFI_MAX_USABLE_ADDRESS to 64 bits to get more available
  memory.

   * When users grown the initramfs, then probably will get initramfs
  not found which really annoyed and impact the user experience (system
  not able to boot).

  [Test Plan]

   * detailed instructions how to reproduce the bug:

  1. Any method to grow the initramfs, such as install nvidia-driver.

  2. If developers would like to reproduce, then could dd if=/dev/random
  of=... bs=1M count=500, something like:

  ```
  $ cat /usr/share/initramfs-tools/hooks/zzz-touch-a-file
  #!/bin/sh

  PREREQ=""

  prereqs()
  {
  echo "$PREREQ"
  }

  case $1 in
  # get pre-requisites
  prereqs)
  prereqs
  exit 0
  ;;
  esac

  . /usr/share/initramfs-tools/hook-functions
  dd if=/dev/random of=${DESTDIR}/test-500M bs=1M count=500
  ```

  And then update-initramfs

   * After applying my patches, the issue is gone.

   * I did also test my test grubx64.efi in:

  1. X86_64 qemu with
  1.1. 60M initramfs + 5.15.0-37-generic kernel
  1.2. 565M initramfs + 5.17.0-1011-oem kernel

  2. Amd64 HP mobile workstation with
  2.1. 65M initramfs + 5.15.0-39-generic kernel
  2.2. 771M initramfs + 5.17.0-1011-oem kernel

  All working well.

  [Where problems could occur]

  * The changes almost in i386/efi, thus the impact will be in the i386 / 
x86_64 EFI system.
  The other change is to modify the “grub-core/kern/efi/mm.c” but I use the 
original addressing for “arm/arm64/ia64/riscv32/riscv64”.
  Thus it should not impact them.

  * There is a “#if defined(__x86_64__)” which intent to limit the >
  32bits code in i386 system and also

  ```
   #if defined (__code_model_large__)
  -#define GRUB_EFI_MAX_USABLE_ADDRESS 0x
  +#define GRUB_EFI_MAX_USABLE_ADDRESS __UINTPTR_MAX__
 

[Kernel-packages] [Bug 1991403] Re: mlxbf_gige: fix devm_ioremap error handling

2022-10-04 Thread Stefan Bader
** Changed in: linux-bluefield (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/1991403

Title:
  mlxbf_gige: fix devm_ioremap error handling

Status in linux-bluefield package in Ubuntu:
  Invalid
Status in linux-bluefield source package in Jammy:
  In Progress

Bug description:
  SRU Justification:

  [Impact]

  The following upstream commit was recently added to Jammy:
3a1a274e933f mlxbf_gige: compute MDIO period based on i1clk

  This patch added driver logic that includes a "devm_ioremap"
  call, but the error handling logic pertaining to this call
  is incorrect.

  [Fix]

  The "devm_ioremap" function returns NULL on error, it doesn't 
  return error pointers.  The error handling logic has been
  fixed accordingly.

  [Test Case]

  Boot platform and bring up "oob_net0" interface properly
  Test that network traffic works properly

  [Regression Potential]

  Low, as the patch was reviewed upstream

  [Other]

  None

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/1991403/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991366] Re: Fix Thunderbolt device hotplug fail when connect via thunderbolt dock

2022-10-04 Thread Timo Aaltonen
should end up in 6.1

** Changed in: linux-oem-5.17 (Ubuntu Kinetic)
   Status: New => Invalid

** Changed in: linux-oem-6.0 (Ubuntu Kinetic)
   Status: New => Invalid

** No longer affects: linux (Ubuntu Kinetic)

** No longer affects: linux-oem-5.17 (Ubuntu Kinetic)

** No longer affects: linux-oem-6.0 (Ubuntu Kinetic)

** Changed in: linux (Ubuntu)
   Status: Invalid => Triaged

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.17 in Ubuntu.
https://bugs.launchpad.net/bugs/1991366

Title:
  Fix Thunderbolt device hotplug fail when connect via thunderbolt dock

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Triaged
Status in linux-oem-5.17 package in Ubuntu:
  Invalid
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Invalid
Status in linux-oem-5.17 source package in Jammy:
  In Progress
Status in linux-oem-6.0 source package in Jammy:
  In Progress

Bug description:
  [SRU Justification]

  [Impact]
  Some Dell laptops where booting with Thunderbolt/USB4 devices connected the 
BIOS leaves some of
  the PCIe devices unconfigured. The kernel message shows "No bus number 
available for hot-added bridge". The connected devices can't be found.

  [Fix]
  Current linux PCI distribute the "spare" resources between hotplug ports on 
hot-add but have not done that upon the initial scan. The patches make the 
initial root bus scan path to do the same. The additional patches are just a 
small cleanups that can be applied separately too.

  [Test]
  1. Power on the machine with Thunderbolt/USB4 devices connected.
  2. Check the kernel message to see if "No bus number available for hot-added 
bridge" shows up or not.
  3. Check if the Thunderbolt/USB4 devices works or not.

  [Where problems could occur]
  The patches only apply the same procedures on initial root bus scan which was 
not done. If the BIOS configures the PCI correctly, everything is OK. It only 
takes effect for the BIOS w/ unconfigured PCIe devices.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1991366/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1903288] Re: Power guest secure boot with static keys: kernel portion

2022-10-04 Thread Frank Heimes
** Changed in: linux (Ubuntu)
 Assignee: Canonical Kernel Team (canonical-kernel-team) => (unassigned)

** Changed in: ubuntu-power-systems
   Status: Triaged => Incomplete

** Tags removed: kk-release

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1903288

Title:
  Power guest secure boot with static keys: kernel portion

Status in The Ubuntu-power-systems project:
  Incomplete
Status in linux package in Ubuntu:
  Incomplete

Bug description:
  == Comment: #2 - Daniel John Axtens  - 2020-11-05 
20:15:10 ==
  This is the kernel side of changes needed for LPAR/guest secure boot.

  Because Ubuntu keeps its kernels so wonderfully up to date, I don't
  think there are any extra patches you need to pick up. (I'll double-
  check against the 21.04 tree once my git pulls finish!)

  However, we potentially need some configuration changes to make sure
  kexec-ing into a crashdump kernel still works.

  Because Lockdown requires that kexec kernels are signed by a key
  trusted by IMA, the public key for used for signing the kdump kernel
  needs to be in the IMA keyring or the platform keyring. For host
  secure boot (and in the UEFI case), it's loaded into the platform
  keyring. But in the case of guest secure boot with static keys, it's
  not loaded into the platform keyring so it needs to be loaded into the
  IMA keyring.

  This is easy enough to do. Firstly, load the Secure Boot CA into the
  .primary_trusted_keys keyring via the CONFIG_SYSTEM_TRUSTED_KEYS
  property. We assume the key used to sign the kernel is signed by this
  CA.

  Then, enable IMA_LOAD_X509, which allows certificates signed by a key on the 
.primary_trusted_keys keyring to be loaded into the IMA keyring. Then set 
IMA_X509_PATH to provide a path to the signing key on installed file system. 
(It may also be possible to do this step in userspace, so long as the CA is 
trusted by the kernel.)
   
  Then that key will be loaded into the .ima keyring at boot and be used to 
appraise the kexec kernel for crashdumps.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1903288/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991637] [NEW] Missing iwlwifi-so-a0-gf-a0-74.ucode and iwlwifi-so-a0-gf4-a0-74.ucode

2022-10-04 Thread Daniel van Vugt
Private bug reported:

Missing:

  iwlwifi-so-a0-gf-a0-74.ucode
  iwlwifi-so-a0-gf4-a0-74.ucode

Sorry I don't have more details, only that we need to ship them for the
Kivu project. Eventually that means jammy too.

** Affects: linux-firmware (Ubuntu)
 Importance: Wishlist
 Status: New


** Tags: jammy kivu

** Information type changed from Public to Private

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1991637

Title:
  Missing iwlwifi-so-a0-gf-a0-74.ucode and iwlwifi-so-a0-gf4-a0-74.ucode

Status in linux-firmware package in Ubuntu:
  New

Bug description:
  Missing:

    iwlwifi-so-a0-gf-a0-74.ucode
    iwlwifi-so-a0-gf4-a0-74.ucode

  Sorry I don't have more details, only that we need to ship them for
  the Kivu project. Eventually that means jammy too.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/1991637/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1990859] Re: Ubuntu suspends immediately after logging in

2022-10-04 Thread as
Sorry, but I won't do this. It's quite old post (2013), I'm afraid it's
outdated, I need computer to work, I can't afford whole system to crash.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1990859

Title:
  Ubuntu suspends immediately after logging in

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Ubuntu suspends immediately after logging in (just after entering proper 
password).
  It's happening for a quite some time (about 2/3 months). Not every time, but 
sometimes (about 50%) Ubuntu suspends after logging in.

  To wake up system I have to push power button on docking station

  It could be caused by laptop which have closed lid, and connected
  external monitor. It didn't happen a long time ago - at least I don't
  remember.

  
  OS: Ubuntu 22.04.1 LTS x86_64 
  Host: 20T6000TPB ThinkPad E14 Gen 2 
  Kernel: 5.15.0-48-generic 
  Uptime: 5 mins 
  Packages: 4521 (dpkg), 58 (brew), 13 (flatpak), 83 (snap) 
  Shell: zsh 5.8.1 
  Resolution: 4384x2466 
  DE: GNOME 42.4 
  WM: Mutter 
  WM Theme: Adwaita 
  Theme: Yaru-dark [GTK2/3] 
  Icons: Yaru [GTK2/3] 
  Terminal: mate-terminal 
  Terminal Font: Monospace 10 
  CPU: AMD Ryzen 5 4500U with Radeon Graphics (6) @ 2.375GHz 
  GPU: AMD ATI 05:00.0 Renoir

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: linux-image-5.15.0-48-generic 5.15.0-48.54
  ProcVersionSignature: Ubuntu 5.15.0-48.54-generic 5.15.53
  Uname: Linux 5.15.0-48-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC2:  as 7081 F pulseaudio
   /dev/snd/controlC1:  as 7081 F pulseaudio
   /dev/snd/controlC0:  as 7081 F pulseaudio
  CasperMD5CheckResult: unknown
  CurrentDesktop: ubuntu:GNOME
  Date: Mon Sep 26 17:14:57 2022
  InstallationDate: Installed on 2020-12-06 (659 days ago)
  InstallationMedia: Ubuntu 20.10 "Groovy Gorilla" - Release amd64 (20201022)
  MachineType: LENOVO 20T6000TPB
  ProcFB: 0 amdgpudrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.15.0-48-generic 
root=UUID=a5796f3d-37a8-428b-aa28-c160ea77bc9b ro quiet splash vt.handoff=7
  RelatedPackageVersions:
   linux-restricted-modules-5.15.0-48-generic N/A
   linux-backports-modules-5.15.0-48-generic  N/A
   linux-firmware 20220329.git681281e4-0ubuntu3.5
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 09/06/2021
  dmi.bios.release: 1.16
  dmi.bios.vendor: LENOVO
  dmi.bios.version: R1AET40W (1.16 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 20T6000TPB
  dmi.board.vendor: LENOVO
  dmi.board.version: Not Defined
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: None
  dmi.ec.firmware.release: 1.16
  dmi.modalias: 
dmi:bvnLENOVO:bvrR1AET40W(1.16):bd09/06/2021:br1.16:efr1.16:svnLENOVO:pn20T6000TPB:pvrThinkPadE14Gen2:rvnLENOVO:rn20T6000TPB:rvrNotDefined:cvnLENOVO:ct10:cvrNone:skuLENOVO_MT_20T6_BU_Think_FM_ThinkPadE14Gen2:
  dmi.product.family: ThinkPad E14 Gen 2
  dmi.product.name: 20T6000TPB
  dmi.product.sku: LENOVO_MT_20T6_BU_Think_FM_ThinkPad E14 Gen 2
  dmi.product.version: ThinkPad E14 Gen 2
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1990859/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989983] Re: kinetic: apply new apparmor and LSM stacking patch set

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1990236] Re: 5.19.0-17.17: kernel NULL pointer dereference, address: 0000000000000084

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1988732] Re: Kinetic update: v5.19.6 upstream stable release

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1986848] Re: Kinetic update: v5.19.1 upstream stable release

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1988120] Re: Support Intel TDX guest attestation driver

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1983640] Re: refactoring of overlayfs fix to properly support shiftfs

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1987345] Re: Kinetic update: v5.19.3 upstream stable release

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1988733] Re: Kinetic update: v5.19.7 upstream stable release

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1987923] Re: Kinetic update: v5.19.4 upstream stable release

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1986865] Re: Kinetic update: v5.19.2 upstream stable release

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1987513] Re: Use upstream LED description on Unmatched

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1987312] Re: IWLMEI may cause device down at resuming from s2idle

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1989258] Re: multiple kernel oops regarding hung tasks delaying boot

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1984103] Re: [UBUNTU 22.04] s390/qeth: cache link_info for ethtool

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1989518] Re: AMD ACP 6.2 DMIC support

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1988207] Re: Kinetic update: v5.19.5 upstream stable release

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1989046] Re: support independent clock and LED GPIOs for Intel IPU6 platforms

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1980621] Re: Fix blank screen on Thinkpad ADL 4K+ panel

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1959940] Re: [22.10 FEAT] KVM: Secure Execution guest dump encryption with customer keys - kernel part

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1980829] Re: System freeze after resuming from suspend due to PCI ASPM settings

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1942999] Re: Fix invalid MAC address after hotplug tbt dock

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1959890] Re: [22.04 FEAT] Deactivitate CONFIG_QETH_OSX kernel config option

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1639924] Re: Kernel livepatch support for for s390x

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1980861] Re: Please enable CONFIG_SQUASHFS_DECOMP_MULTI_PERCPU

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1853306] Re: [22.04 FEAT] Enhanced Interpretation for PCI Functions on s390x - kernel part

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1959542] Re: [22.10 FEAT] [IO2201] Independent Usage of Secondary Physical Function

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1982930] Re: ioam6.sh in net from ubuntu_kernel_selftests fails with 5.15 kernels in Focal

2022-10-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.19.0-18.18

---
linux (5.19.0-18.18) kinetic; urgency=medium

  * kinetic/linux: 5.19.0-18.18 -proposed tracker (LP: #1990366)

  * 5.19.0-17.17: kernel NULL pointer dereference, address: 0084
(LP: #1990236)
- Revert "UBUNTU: SAUCE: apparmor: Fix regression in stacking due to label
  flags"
- Revert "UBUNTU: [Config] disable SECURITY_APPARMOR_RESTRICT_USERNS"
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - add an internal buffer""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't wait on cleanup""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - don't waste entropy""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - always add a pending
  request""
- Revert "UBUNTU: SAUCE: Revert "hwrng: virtio - unregister device before
  reset""
- Revert "UBUNTU: SAUCE: Revert "virtio-rng: make device ready before making
  request""
- Revert "UBUNTU: [Config] update configs after apply new apparmor patch 
set"
- Revert "UBUNTU: SAUCE: apparmor: add user namespace creation mediation"
- Revert "UBUNTU: SAUCE: selinux: Implement userns_create hook"
- Revert "UBUNTU: SAUCE: bpf-lsm: Make bpf_lsm_userns_create() sleepable"
- Revert "UBUNTU: SAUCE: security, lsm: Introduce security_create_user_ns()"
- Revert "UBUNTU: SAUCE: lsm stacking v37: AppArmor: Remove the exclusive
  flag"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add /proc attr entry for 
full
  LSM context"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Removed scaffolding function
  lsmcontext_init"
- Revert "UBUNTU: SAUCE: lsm stacking v37: netlabel: Use a struct lsmblob in
  audit data"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple
  object contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: audit: multiple subject lsm 
values
  for netlabel"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Add record for multiple 
task
  security contexts"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Allow multiple records in 
an
  audit_buffer"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add a function to report
  multiple LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Create audit_stamp
  structure"
- Revert "UBUNTU: SAUCE: lsm stacking v37: Audit: Keep multiple LSM data in
  audit_names"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx
  module selection"
- Revert "UBUNTU: SAUCE: lsm stacking v37: binder: Pass LSM identifier for
  confirmation"
- Revert "UBUNTU: SAUCE: lsm stacking v37: NET: Store LSM netlabel data in a
  lsmblob"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: security_secid_to_secctx in
  netlink netfilter"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_dentry_init_security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_inode_getsecctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmcontext in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Ensure the correct LSM 
context
  releaser"
- Revert "UBUNTU: SAUCE: fixup lsm stacking v37: LSM: Specify which LSM to
  display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Specify which LSM to 
display"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_cred_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_inode_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_current_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_ipc_getsecid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secid_to_secctx"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_secctx_to_secid"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_kernel_act_as"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Use lsmblob in
  security_audit_rule_match"
- Revert "UBUNTU: SAUCE: lsm stacking v37: IMA: avoid label collisions with
  stacked LSMs"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: provide lsm name and id slot
  mappings"
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Add the lsmblob data
  structure."
- Revert "UBUNTU: SAUCE: lsm stacking v37: LSM: Infrastructure management of
  the sock security"
- Revert "UBUNTU: SAUCE: lsm stacking v37: integrity: disassociate
  ima_filter_rule from security_audit_rule"
- Revert "UBUNTU: SAUCE: apparmor: LSM stacking: switch from SK_CTX() to
  aa_sock()"
- Revert "UBUNTU: SAUCE: apparmor: Add fine grained mediation of posix
  mqueues"
- Revert "UBUNTU: SAUCE: apparmor: rename aa_sock() to aa_unix_sk()"
- Revert

[Kernel-packages] [Bug 1991112] Re: mlxbf_gige: compute MDIO period based on i1clk

2022-10-04 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-
bluefield/5.15.0-1008.10 kernel in -proposed solves the problem. Please
test the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-jammy' to 'verification-
done-jammy'. If the problem still exists, change the tag 'verification-
needed-jammy' to 'verification-failed-jammy'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/1991112

Title:
  mlxbf_gige: compute MDIO period based on i1clk

Status in linux-bluefield package in Ubuntu:
  Invalid
Status in linux-bluefield source package in Jammy:
  Fix Committed

Bug description:
  The following upstream patch should be cherry picked to jammy kernel:

  3a1a274e933f mlxbf_gige: compute MDIO period based on i1clk

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/1991112/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991113] Re: "source" PKA driver Kconfig in mellanox/Kconfig

2022-10-04 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-
bluefield/5.15.0-1008.10 kernel in -proposed solves the problem. Please
test the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-jammy' to 'verification-
done-jammy'. If the problem still exists, change the tag 'verification-
needed-jammy' to 'verification-failed-jammy'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/1991113

Title:
  "source" PKA driver Kconfig in mellanox/Kconfig

Status in linux-bluefield package in Ubuntu:
  Invalid
Status in linux-bluefield source package in Jammy:
  Fix Committed

Bug description:
  PKA driver Kconfig needs to be "sourced" in mellanox/Kconfig. This
  makes MLXBF_PKA config option visible by the kernel configuration
  system and is needed to actually build PKA driver.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/1991113/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989495] Re: mlxbf_gige: need to clear MDIO gateway lock after read

2022-10-04 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-
bluefield/5.15.0-1008.10 kernel in -proposed solves the problem. Please
test the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-jammy' to 'verification-
done-jammy'. If the problem still exists, change the tag 'verification-
needed-jammy' to 'verification-failed-jammy'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/1989495

Title:
  mlxbf_gige: need to clear MDIO gateway lock after read

Status in linux-bluefield package in Ubuntu:
  Invalid
Status in linux-bluefield source package in Focal:
  Fix Committed
Status in linux-bluefield source package in Jammy:
  Fix Committed

Bug description:
  SRU Justification:

  [Impact]
  The BlueField-2 GIGE logic accesses the MDIO device via reads/writes
  to a gateway (GW) register. The MDIO GW lock is set after read. Make
  sure to always clear to indicate that the GW register is not being used.
  If the lock is mistakenly interpreted as ACTIVE, then subsequent MDIO
  accesses will be blocked and PHY device will be inaccessible.

  [Fix]
  For each MDIO read and write transaction, the last step should
  be to clear the MDIO GW lock.

  [Test Case]
  Boot the BlueField-2 platform
  Bring up the "oob_net0" interface via DHCP or static IP
  Ping and file transfer over "oob_net0" should work properly
  Bounce the "oob_net0" interface a few times and repeat tests

  [Regression Potential]
  * Low risk for causing a regression, tested well in our lab.

  [Other]
  * None

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/1989495/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989172] Re: mlxbf-pmc: error when reading unprogrammed events

2022-10-04 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-
bluefield/5.15.0-1008.10 kernel in -proposed solves the problem. Please
test the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-jammy' to 'verification-
done-jammy'. If the problem still exists, change the tag 'verification-
needed-jammy' to 'verification-failed-jammy'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/1989172

Title:
  mlxbf-pmc: error when reading unprogrammed events

Status in linux-bluefield package in Ubuntu:
  Invalid
Status in linux-bluefield source package in Focal:
  Fix Committed
Status in linux-bluefield source package in Jammy:
  Fix Committed

Bug description:
  SRU Justification:

  [Impact]
  When the counters are not programmed to monitor any events, reading the 
"event" file results in the following error:
  cat: /sys/class/hwmon/hwmon0/smmu0/event0: Invalid argument
  This is misleading and instead needs to indicate that the counter is 
currently not enabled.

  [Fix]
  * First, skip the check for whether the counter is enabled when reading the 
event info. If the counter is not enabled, it should return 0, which is the 
default value when coming out of reset.
  * 0 is not a valid event in most blocks as per the respective event lists, so 
add a "Disable" event to all the event lists.

  [Test Case]
  Without the fix, reading any "event" file right after reset when the counters 
are not programmed should result in the following error:
  cat: /sys/class/hwmon/hwmon0/smmu0/event0: Invalid argumen
  With the fix, it should instead print:
  0x0: DISABLE

  [Regression Potential]
  Can be considered minimal

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/1989172/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1983498] Re: Jammy: Add OVS Internal Port HW Offload to mlx5 driver

2022-10-04 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-
bluefield/5.15.0-1008.10 kernel in -proposed solves the problem. Please
test the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-jammy' to 'verification-
done-jammy'. If the problem still exists, change the tag 'verification-
needed-jammy' to 'verification-failed-jammy'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1983498

Title:
  Jammy: Add OVS Internal Port HW Offload to mlx5 driver

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Fix Released

Bug description:
  SRU Justification

  [Impact]

  A request has been made, originating from
  https://bugs.launchpad.net/bugs/1980730, to add support for OVS
  internal port offload for the mlx5 driver. This feature takes care of
  certain traffic workloads that are not currently being offloaded to
  the hardware.

  [Test Case]

  Tested by the requester.

  [Where things could go wrong]

  These changes could potentially introduce regressions in behavior of
  the mlx5 driver.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1983498/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1983640] Re: refactoring of overlayfs fix to properly support shiftfs

2022-10-04 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-
bluefield/5.15.0-1008.10 kernel in -proposed solves the problem. Please
test the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-jammy' to 'verification-
done-jammy'. If the problem still exists, change the tag 'verification-
needed-jammy' to 'verification-failed-jammy'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1983640

Title:
  refactoring of overlayfs fix to properly support shiftfs

Status in linux package in Ubuntu:
  Fix Released
Status in linux-hwe-5.17 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Fix Released
Status in linux-hwe-5.17 source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  Fix Released
Status in linux-hwe-5.17 source package in Kinetic:
  Invalid

Bug description:
  [Impact]

  Starting with 5.13 we've incorrectly dropped the following sauce
  patch:

  UBUNTU: SAUCE: overlayfs: fix incorrect mnt_id of files opened
  from map_files

  This patch is required to use overlayfs on top of shiftfs and without
  this patch we may break containers that rely on shiftfs (using
  zfs/ceph as storage pool w/ shiftfs enabled).

  However, we made this patch dependent on AUFS, starting with Jammy
  we're not enabling AUFS anymore, so this fix becomes a no-op.

  So we need to re-introduce this fix with a bit of refactoring to not
  depend on AUFS.

  [Test case]

  The following script can be used to trigger the issue:

    #!/bin/bash

    cat > test.py << EOF
    import sys

    f = open("/proc/self/maps")

    for l in f.readlines():
  if "python" not in l:
    continue
  print(l)
  s = l.split()
  start, end = s[0].split("-")
  fname = s[-1]
  print(start, end, fname)
  break
    else:
  sys.exit(1)

    test_file1 = open(fname)
    test_file2 = open("/proc/self/map_files/%s-%s" % (start, end))

    fdinfo1 = open("/proc/self/fdinfo/%d" % test_file1.fileno()).read()
    fdinfo2 = open("/proc/self/fdinfo/%d" % test_file2.fileno()).read()

    if fdinfo1 != fdinfo2:
  print("FAIL")
  print(test_file1)
  print(fdinfo1)
  print(test_file2)
  print(fdinfo2)
  sys.exit(1)
    print("PASS")
    EOF
    sudo docker run -it --privileged --rm -v `pwd`:/mnt python python 
/mnt/test.py

  [Fix]

  Import the right pieces from AUFS to properly support the fix and get 
  rid of the AUFS dependency across all our kernels and re-apply the 
  overlayfs fix without the AUFS dependency.

  [Regression potential]

  This patch is touching overlayfs, so we may see potential regressions
  in overlayfs, especially when containers are used.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1983640/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1986798] Re: Remove unused variable from i915 psr

2022-10-04 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-
bluefield/5.15.0-1008.10 kernel in -proposed solves the problem. Please
test the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-jammy' to 'verification-
done-jammy'. If the problem still exists, change the tag 'verification-
needed-jammy' to 'verification-failed-jammy'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1986798

Title:
  Remove unused variable from i915 psr

Status in linux package in Ubuntu:
  Won't Fix
Status in linux source package in Jammy:
  Fix Released

Bug description:
  [Impact]
  Compiler warns unused variable after commit 0c1d6921b07c ("UBUNTU:
  SAUCE: drm/i915/display/psr: Reinstate fix for TGL + AUO panel flicker")

  [Fix]
  The variable is unused, remove it.

  [Test]
  Compiler no longer warns about it.

  [Where problems could occur]
  Nothing.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1986798/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991656] [NEW] irdma Kernel module huge memory usage > 5GB

2022-10-04 Thread Federico Foschini
Public bug reported:

irdma Kernel module will use > 5GB as soon as is loaded. This bug is
present from kernel 5.14.

# free -m
   total used free shared buff/cache available
Mem: 15663 5998 8936 155 728 9213
Swap: 0 0 0

Using ps the sum of RSS memory does not adds up: it shows less than 1GiB
used:

# ps aux | awk '{sum+=$6} END {print sum / 1024}'
944.879

By running modprobe -r irdma nearly 5,5GB of memory is freed.

The only workaround to this bug is blacklisting irdma module so i40e is
loaded without bringing up irdma.

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: linux-generic 5.15.0.48.48
ProcVersionSignature: Ubuntu 5.15.0-48.54-generic 5.15.53
Uname: Linux 5.15.0-48-generic x86_64
AlsaDevices:
 total 0
 crw-rw 1 root audio 116,  1 Oct  3 13:42 seq
 crw-rw 1 root audio 116, 33 Oct  3 13:42 timer
AplayDevices: Error: [Errno 2] No such file or directory: 'aplay'
ApportVersion: 2.20.11-0ubuntu82.1
Architecture: amd64
ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord'
AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
CRDA: N/A
CasperMD5CheckResult: unknown
Date: Tue Oct  4 10:37:46 2022
IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig'
MachineType: Supermicro SYS-5019D-FN8TP
PciMultimedia:
 
ProcEnviron:
 TERM=xterm-256color
 PATH=(custom, no user)
 LANG=en_US.UTF-8
 SHELL=/bin/bash
ProcFB: 0 astdrmfb
ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.15.0-48-generic 
root=/dev/mapper/ubuntu--vg-ubuntu--lv ro fsck.repair=yes 
debian-installer/language=it keyboard-configuration/layoutcode?=it
RelatedPackageVersions:
 linux-restricted-modules-5.15.0-48-generic N/A
 linux-backports-modules-5.15.0-48-generic  N/A
 linux-firmware 20220329.git681281e4-0ubuntu3.5
RfKill: Error: [Errno 2] No such file or directory: 'rfkill'
SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 05/25/2021
dmi.bios.release: 5.14
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: 1.5
dmi.board.asset.tag: To be filled by O.E.M.
dmi.board.name: X11SDV-8C-TP8F
dmi.board.vendor: Supermicro
dmi.board.version: 1.10
dmi.chassis.asset.tag: To be filled by O.E.M.
dmi.chassis.type: 1
dmi.chassis.vendor: Supermicro
dmi.chassis.version: 0123456789
dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr1.5:bd05/25/2021:br5.14:svnSupermicro:pnSYS-5019D-FN8TP:pvr0123456789:rvnSupermicro:rnX11SDV-8C-TP8F:rvr1.10:cvnSupermicro:ct1:cvr0123456789:skuTobefilledbyO.E.M.:
dmi.product.family: To be filled by O.E.M.
dmi.product.name: SYS-5019D-FN8TP
dmi.product.sku: To be filled by O.E.M.
dmi.product.version: 0123456789
dmi.sys.vendor: Supermicro

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug jammy

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1991656

Title:
  irdma Kernel module huge memory usage > 5GB

Status in linux package in Ubuntu:
  New

Bug description:
  irdma Kernel module will use > 5GB as soon as is loaded. This bug is
  present from kernel 5.14.

  # free -m
 total used free shared buff/cache available
  Mem: 15663 5998 8936 155 728 9213
  Swap: 0 0 0

  Using ps the sum of RSS memory does not adds up: it shows less than
  1GiB used:

  # ps aux | awk '{sum+=$6} END {print sum / 1024}'
  944.879

  By running modprobe -r irdma nearly 5,5GB of memory is freed.

  The only workaround to this bug is blacklisting irdma module so i40e
  is loaded without bringing up irdma.

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: linux-generic 5.15.0.48.48
  ProcVersionSignature: Ubuntu 5.15.0-48.54-generic 5.15.53
  Uname: Linux 5.15.0-48-generic x86_64
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 Oct  3 13:42 seq
   crw-rw 1 root audio 116, 33 Oct  3 13:42 timer
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay'
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord'
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  CRDA: N/A
  CasperMD5CheckResult: unknown
  Date: Tue Oct  4 10:37:46 2022
  IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig'
  MachineType: Supermicro SYS-5019D-FN8TP
  PciMultimedia:
   
  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no user)
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 astdrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.15.0-48-generic 
root=/dev/mapper/ubuntu--vg-ubuntu--lv ro fsck.repair=yes 
debian-installer/language=it keyboard-configuration/layoutcode?=it
  RelatedPackageVersions:
   linux-restricted-modules-5.15.0-48-generic N/A
   linux-backports-modules-5.15.0-48-generic  N/A
   linux-firmware 20220329.gi

[Kernel-packages] [Bug 1959940] Re: [22.10 FEAT] KVM: Secure Execution guest dump encryption with customer keys - kernel part

2022-10-04 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1959940

Title:
  [22.10 FEAT] KVM: Secure Execution guest dump encryption with customer
  keys - kernel part

Status in Ubuntu on IBM z Systems:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released

Bug description:
  KVM: Secure Execution guest dump encryption with customer keys -
  kernel part

  Description:
  Hypervisor-initiated dumps for Secure Execution guests are not helpful 
because memory and CPU state is encrypted by a transient key only available to 
the Ultravisor.  Workload owners can still configure kdump in order to obtain 
kernel crash infomation, but there are situation where kdump doesn't work. In 
such situations problem determination is severely impeded. This feature will 
implement dumps created in a way that can only be decrypted by the owner of the 
guest image and be used for problem determination.

  Request Type: Kernel - Enhancement from IBM
  Upstream Acceptance: In Progress
  Code Contribution: IBM code

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959940/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1853306] Re: [22.04 FEAT] Enhanced Interpretation for PCI Functions on s390x - kernel part

2022-10-04 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1853306

Title:
  [22.04 FEAT] Enhanced Interpretation for PCI Functions on s390x -
  kernel part

Status in Ubuntu on IBM z Systems:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released

Bug description:
  The PCI Passthrough implementation is based on intercepting PCI I/O 
instructions which leads to a reduced I/O performance compared to execution of 
PCI instructions in LPAR. 
  For improved performance the interpretive execution of the PCI store and PCI 
load instructions get enabled. 
  Further improvement is achieved by enabling the Adapter-Event-Notification

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1853306/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1639924] Re: Kernel livepatch support for for s390x

2022-10-04 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: Triaged => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1639924

Title:
  Kernel livepatch support for for s390x

Status in Ubuntu on IBM z Systems:
  In Progress
Status in gcc-11 package in Ubuntu:
  Fix Released
Status in kpatch package in Ubuntu:
  New
Status in linux package in Ubuntu:
  Fix Released
Status in gcc-11 source package in Jammy:
  Fix Released
Status in kpatch source package in Jammy:
  New
Status in linux source package in Jammy:
  New
Status in gcc-11 source package in Kinetic:
  Fix Released
Status in kpatch source package in Kinetic:
  New
Status in linux source package in Kinetic:
  Fix Released

Bug description:
  Kernel live-patch is afaik fully upstream and available for 'all' platforms 
(incl. s390x).
  But the kpatch-build tool does only support amd64 as of today.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1639924/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1959542] Re: [22.10 FEAT] [IO2201] Independent Usage of Secondary Physical Function

2022-10-04 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1959542

Title:
  [22.10 FEAT] [IO2201] Independent Usage of Secondary Physical Function

Status in Ubuntu on IBM z Systems:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released

Bug description:
  Title: Independent Usage of Secondary Physical Function"

  Description:
  "This feature adds the ability for a Linux running in LPAR to use the 
Physical Function (PF) associated with the second port of a ConnectX-5/6 card 
independent of that of the first port.
  Prior to this feature, if the secondary PF was attached to an LPAR without 
also attaching the primary PF, no PCI function would be visible in Linux. The 
function would instead remain
  in a hidden and disabled state. Conversely it has always been possible to use 
the primary PF without attaching the secondary PF. This existing behavior is 
confusing and needlessly
  restricts flexible usage of these powerful network cards. The new behavior of 
allowing independent usage is also in accordance with the PCI SR-IOV 
specification which explicitly
  defines the dependencies between PCI functions in the Dependency Link field 
which is still honored and for ConnectX-5/6 cards allows this independent 
usage."

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959542/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991656] Status changed to Confirmed

2022-10-04 Thread Ubuntu Kernel Bot
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1991656

Title:
  irdma Kernel module huge memory usage > 5GB

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  irdma Kernel module will use > 5GB as soon as is loaded. This bug is
  present from kernel 5.14.

  # free -m
 total used free shared buff/cache available
  Mem: 15663 5998 8936 155 728 9213
  Swap: 0 0 0

  Using ps the sum of RSS memory does not adds up: it shows less than
  1GiB used:

  # ps aux | awk '{sum+=$6} END {print sum / 1024}'
  944.879

  By running modprobe -r irdma nearly 5,5GB of memory is freed.

  The only workaround to this bug is blacklisting irdma module so i40e
  is loaded without bringing up irdma.

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: linux-generic 5.15.0.48.48
  ProcVersionSignature: Ubuntu 5.15.0-48.54-generic 5.15.53
  Uname: Linux 5.15.0-48-generic x86_64
  AlsaDevices:
   total 0
   crw-rw 1 root audio 116,  1 Oct  3 13:42 seq
   crw-rw 1 root audio 116, 33 Oct  3 13:42 timer
  AplayDevices: Error: [Errno 2] No such file or directory: 'aplay'
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord'
  AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', 
'/dev/snd/timer'] failed with exit code 1:
  CRDA: N/A
  CasperMD5CheckResult: unknown
  Date: Tue Oct  4 10:37:46 2022
  IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig'
  MachineType: Supermicro SYS-5019D-FN8TP
  PciMultimedia:
   
  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no user)
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 astdrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.15.0-48-generic 
root=/dev/mapper/ubuntu--vg-ubuntu--lv ro fsck.repair=yes 
debian-installer/language=it keyboard-configuration/layoutcode?=it
  RelatedPackageVersions:
   linux-restricted-modules-5.15.0-48-generic N/A
   linux-backports-modules-5.15.0-48-generic  N/A
   linux-firmware 20220329.git681281e4-0ubuntu3.5
  RfKill: Error: [Errno 2] No such file or directory: 'rfkill'
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 05/25/2021
  dmi.bios.release: 5.14
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 1.5
  dmi.board.asset.tag: To be filled by O.E.M.
  dmi.board.name: X11SDV-8C-TP8F
  dmi.board.vendor: Supermicro
  dmi.board.version: 1.10
  dmi.chassis.asset.tag: To be filled by O.E.M.
  dmi.chassis.type: 1
  dmi.chassis.vendor: Supermicro
  dmi.chassis.version: 0123456789
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr1.5:bd05/25/2021:br5.14:svnSupermicro:pnSYS-5019D-FN8TP:pvr0123456789:rvnSupermicro:rnX11SDV-8C-TP8F:rvr1.10:cvnSupermicro:ct1:cvr0123456789:skuTobefilledbyO.E.M.:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: SYS-5019D-FN8TP
  dmi.product.sku: To be filled by O.E.M.
  dmi.product.version: 0123456789
  dmi.sys.vendor: Supermicro

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1991656/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1990697] Re: Crash on resume from sleep - 22.04, Thinkpad T14 (AMD) Gen 2

2022-10-04 Thread Bryan Everly
Yes.  I have included a tarball of everything under that directory.
Thank you for looking into this!

** Attachment added: "pstore.tgz"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1990697/+attachment/5621018/+files/pstore.tgz

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1990697

Title:
  Crash on resume from sleep - 22.04, Thinkpad T14 (AMD) Gen 2

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  I'm seeing this 2-3 times per week.  My system is configured with
  "Linux Suspend" in the BIOS (not the Windows/Modern setting).
  Furthermore, when plugged in, my system does not sleep.

  When I come up to my laptop after inactivity, the screens are dark
  (but as noted above, it is not suspended).  If I click on a key and
  wait for both external monitors to light up, I can generally hit enter
  at that point, type my password and get in.

  If, however, I'm in a hurry or not thinking about it and just walk up
  to the machine, hit enter, type my password and hit enter a second
  time, I can generally reproduce the problem.  The screen either goes
  to a backlit entirely black view, or (more commonly) a light grey (not
  the same color of grey as the Ubuntu login screen, much more white in
  the crashed state).

  The system is completely unresponsive and cannot be pinged or ssh'ed
  into from the outside.  The only cure is to long-press the power
  button until it powers down, wait a moment and press it again to
  restart.

  Upon suggestions from the #Ubuntu mattermost channel, I ran:

  # journalctl -xe -b -1

  That generated the following data:

  Sep 23 11:35:35 T14 kernel: RIP: 0010:update_config+0x11b/0x280 [amdgpu]
  Sep 23 11:35:35 T14 kernel: Code: 13 0f 00 00 41 0f b6 44 24 03 88 83 1e 0f 
00 >
  Sep 23 11:35:35 T14 kernel: RSP: 0018:9b4743bab618 EFLAGS: 00010202
  Sep 23 11:35:35 T14 kernel: RAX:  RBX: 8a578653cf88 RCX: 
ff>
  Sep 23 11:35:35 T14 kernel: RDX: 8a578653dea0 RSI: 9b4743bab668 RDI: 
ff>
  Sep 23 11:35:35 T14 kernel: RBP: 9b4743bab658 R08:  R09: 
00>
  Sep 23 11:35:35 T14 kernel: R10: 5649 R11: 0010 R12: 
ff>
  Sep 23 11:35:35 T14 kernel: R13: 8a57a5eda000 R14: 0001 R15: 
ff>
  Sep 23 11:35:35 T14 kernel: FS:  7fb5f59a35c0() 
GS:8a5e4f04(000>
  Sep 23 11:35:35 T14 kernel: CS:  0010 DS:  ES:  CR0: 80050033
  Sep 23 11:35:35 T14 kernel: CR2:  CR3: 0001704d6000 CR4: 
00>
  Sep 23 11:35:35 T14 kernel: PKRU: 5554
  Sep 23 11:35:38 T14 kernel: input: PLT V5200 Series (AVRCP) as 
/devices/virtual>
  Sep 23 11:35:38 T14 pulseaudio[3488]: Battery Level: 90%
  Sep 23 11:35:38 T14 pulseaudio[3488]: Dock Status: undocked
  Sep 23 11:35:38 T14 systemd-logind[1832]: Watching system buttons on 
/dev/input>
  Sep 23 11:35:39 T14 bluetoothd[1809]: 
/org/bluez/hci0/dev_BC_F2_92_A0_AC_33/sep>
  Sep 23 11:35:39 T14 rtkit-daemon[2111]: Supervising 9 threads of 4 processes 
of>
  Sep 23 11:35:39 T14 rtkit-daemon[2111]: Successfully made thread 41544 of 
proce>
  Sep 23 11:35:39 T14 rtkit-daemon[2111]: Supervising 10 threads of 4 processes 
o>
  Sep 23 11:35:39 T14 pulseaudio[3488]: org.freedesktop.DBus.Properties.Get 
/org/>
  Sep 23 11:35:41 T14 audit[4797]: SECCOMP auid=1000 uid=1000 gid=1000 ses=3 
subj>
  Sep 23 11:35:41 T14 kernel: audit: type=1326 audit(1663947341.195:578): 
auid=10>
  --- 
  ProblemType: Bug
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC3:  bceverly   2902 F pulseaudio
   /dev/snd/controlC1:  bceverly   2902 F pulseaudio
   /dev/snd/controlC2:  bceverly   2902 F pulseaudio
   /dev/snd/controlC0:  bceverly   2902 F pulseaudio
  CRDA: N/A
  CasperMD5CheckResult: pass
  DistroRelease: Ubuntu 22.04
  InstallationDate: Installed on 2022-05-30 (116 days ago)
  InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Release amd64 
(20220419)
  MachineType: LENOVO 20XK0015US
  Package: linux (not installed)
  ProcEnviron:
   TERM=xterm-256color
   PATH=(custom, no user)
   LANG=en_US.UTF-8
   SHELL=/bin/bash
  ProcFB: 0 amdgpudrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.15.0-48-generic 
root=UUID=162f2be8-a3c8-4554-a76a-2cbb2ce3e446 ro quiet splash vt.handoff=7
  ProcVersionSignature: Ubuntu 5.15.0-48.54-generic 5.15.53
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.15.0-48-generic N/A
   linux-backports-modules-5.15.0-48-generic  N/A
   linux-firmware 20220329.git681281e4-0ubuntu3.5
  Tags:  jammy
  Uname: Linux 5.15.0-48-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkFor

[Kernel-packages] [Bug 1989172] Re: mlxbf-pmc: error when reading unprogrammed events

2022-10-04 Thread Shravan Kumar Ramani
** Tags added: verification-done-jammy

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/1989172

Title:
  mlxbf-pmc: error when reading unprogrammed events

Status in linux-bluefield package in Ubuntu:
  Invalid
Status in linux-bluefield source package in Focal:
  Fix Committed
Status in linux-bluefield source package in Jammy:
  Fix Committed

Bug description:
  SRU Justification:

  [Impact]
  When the counters are not programmed to monitor any events, reading the 
"event" file results in the following error:
  cat: /sys/class/hwmon/hwmon0/smmu0/event0: Invalid argument
  This is misleading and instead needs to indicate that the counter is 
currently not enabled.

  [Fix]
  * First, skip the check for whether the counter is enabled when reading the 
event info. If the counter is not enabled, it should return 0, which is the 
default value when coming out of reset.
  * 0 is not a valid event in most blocks as per the respective event lists, so 
add a "Disable" event to all the event lists.

  [Test Case]
  Without the fix, reading any "event" file right after reset when the counters 
are not programmed should result in the following error:
  cat: /sys/class/hwmon/hwmon0/smmu0/event0: Invalid argumen
  With the fix, it should instead print:
  0x0: DISABLE

  [Regression Potential]
  Can be considered minimal

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-bluefield/+bug/1989172/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991664] [NEW] backport dkms fixes to build modules correctly for hwe-5.19+ kernels

2022-10-04 Thread Dimitri John Ledkov
Public bug reported:

[ Impact ]

 * hwe-5.19 kernel has to be compiled with gcc-12+ for the new security
kernel config options that have been enabled in that kernel (init zero
structs).

 * dkms needs to be patched to attempt to use the same compiler as was
used to build the kernel, specifically use gcc for v5.15 but gcc-12 for
v5.19+ in jammy

 * dkms autopkgtests also need to be improved to ensure there are no
false negatives when kernel has module under test already built-in at
the same version.

 * because linux-headers packages in Ubuntu do not depend on a
toolchain, and it is very hard to correctly depend on a native or cross-
toolchain, add gcc-12 dependency in the dkms package.

[ Test Plan ]

 * Retrigger dkms module test for a built-in package of the same version
as already built into the kernel, for example zfs-linux dkms. It should
pass.

 * Attempt to build dkms modules against v5.15 kernel and v5.19 kernel
from proposed. dkms module should be built with gcc and gcc-12
respectively.

[ Where problems could occur ]

 * New gcc-12 dependency on the dkms package may result in two compilers
being installed in the Ubuntu Desktop Live image

 * New gcc-12 dependency may prevent automatic upgrade/installation of
the dkms package update via unattended upgrades.

[ Other Info ]
 
 * It is questionable for dkms to depend on any c-compiler, given that a module 
for a given kernel can really be built with the same toolchain and the same 
compiler features.

 * In debian, linux kernel packages ship and extra configuration file in
the kernel headers, dkms uses said configuration file to use a matching
compiler, and linux-headers packages depend on the toolchain used to
build a given kernel. Maybe in the future Ubuntu could consider using
the same packaging.

** Affects: dkms (Ubuntu)
 Importance: Undecided
 Status: Fix Released

** Affects: dkms (Ubuntu Jammy)
 Importance: Undecided
 Assignee: Dimitri John Ledkov (xnox)
 Status: Triaged

** Also affects: dkms (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Changed in: dkms (Ubuntu)
   Status: New => Fix Released

** Changed in: dkms (Ubuntu Jammy)
   Status: New => Triaged

** Changed in: dkms (Ubuntu Jammy)
 Assignee: (unassigned) => Dimitri John Ledkov (xnox)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to dkms in Ubuntu.
https://bugs.launchpad.net/bugs/1991664

Title:
  backport dkms fixes to build modules correctly for hwe-5.19+ kernels

Status in dkms package in Ubuntu:
  Fix Released
Status in dkms source package in Jammy:
  Triaged

Bug description:
  [ Impact ]

   * hwe-5.19 kernel has to be compiled with gcc-12+ for the new
  security kernel config options that have been enabled in that kernel
  (init zero structs).

   * dkms needs to be patched to attempt to use the same compiler as was
  used to build the kernel, specifically use gcc for v5.15 but gcc-12
  for v5.19+ in jammy

   * dkms autopkgtests also need to be improved to ensure there are no
  false negatives when kernel has module under test already built-in at
  the same version.

   * because linux-headers packages in Ubuntu do not depend on a
  toolchain, and it is very hard to correctly depend on a native or
  cross-toolchain, add gcc-12 dependency in the dkms package.

  [ Test Plan ]

   * Retrigger dkms module test for a built-in package of the same
  version as already built into the kernel, for example zfs-linux dkms.
  It should pass.

   * Attempt to build dkms modules against v5.15 kernel and v5.19 kernel
  from proposed. dkms module should be built with gcc and gcc-12
  respectively.

  [ Where problems could occur ]

   * New gcc-12 dependency on the dkms package may result in two
  compilers being installed in the Ubuntu Desktop Live image

   * New gcc-12 dependency may prevent automatic upgrade/installation of
  the dkms package update via unattended upgrades.

  [ Other Info ]
   
   * It is questionable for dkms to depend on any c-compiler, given that a 
module for a given kernel can really be built with the same toolchain and the 
same compiler features.

   * In debian, linux kernel packages ship and extra configuration file
  in the kernel headers, dkms uses said configuration file to use a
  matching compiler, and linux-headers packages depend on the toolchain
  used to build a given kernel. Maybe in the future Ubuntu could
  consider using the same packaging.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dkms/+bug/1991664/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1980848] Re: arc_summary doesn't work with HWE kernel 5.15

2022-10-04 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: zfs-linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1980848

Title:
  arc_summary doesn't work with HWE kernel 5.15

Status in zfs-linux package in Ubuntu:
  Confirmed

Bug description:
  # Issue description

  `arc_summary` no longer works with kernel 5.15. It used to work with
  previous kernel like 5.13.

  # Steps to reproduce

  1) setup 20.04 with HWE kernel 5.15
  2) install `zfsutils-linux`
  3) run `arc_summary`
  $ arc_summary 
  Traceback (most recent call last):
File "/usr/sbin/arc_summary", line 875, in 
  main()
File "/usr/sbin/arc_summary", line 826, in main
  kstats = get_kstats()
File "/usr/sbin/arc_summary", line 259, in get_kstats
  with open(PROC_PATH+section, 'r') as proc_location:
  FileNotFoundError: [Errno 2] No such file or directory: 
'/proc/spl/kstat/zfs/xuio_stats'


  Indeed, the xuio_stats file isn't there anymore:
  $ ll /proc/spl/kstat/zfs/
  total 0
  dr-xr-xr-x 21 root root 0 Jul  6 10:49 ./
  dr-xr-xr-x  4 root root 0 Jul  6 10:49 ../
  -rw-r--r--  1 root root 0 Jul  6 10:49 abdstats
  -rw-r--r--  1 root root 0 Jul  6 10:49 arcstats
  dr-xr-xr-x 20 root root 0 Jul  6 10:49 data/
  -rw---  1 root root 0 Jul  6 10:49 dbgmsg
  -rw---  1 root root 0 Jul  6 10:49 dbufs
  -rw-r--r--  1 root root 0 Jul  6 10:49 dbufstats
  dr-xr-xr-x 70 root root 0 Jul  6 10:49 default/
  -rw-r--r--  1 root root 0 Jul  6 10:49 dmu_tx
  -rw-r--r--  1 root root 0 Jul  6 10:49 dnodestats
  -rw-r--r--  1 root root 0 Jul  6 10:49 fletcher_4_bench
  -rw-r--r--  1 root root 0 Jul  6 10:49 fm
  -rw-r--r--  1 root root 0 Jul  6 10:49 import_progress
  -rw-r--r--  1 root root 0 Jul  6 10:49 metaslab_stats
  -rw-r--r--  1 root root 0 Jul  6 10:49 vdev_cache_stats
  -rw-r--r--  1 root root 0 Jul  6 10:49 vdev_mirror_stats
  -rw-r--r--  1 root root 0 Jul  6 10:49 vdev_raidz_bench
  -rw-r--r--  1 root root 0 Jul  6 10:49 zfetchstats
  -rw-r--r--  1 root root 0 Jul  6 10:49 zil
  -rw-r--r--  1 root root 0 Jul  6 10:49 zstd

  
  # Workaround

  This (naive) patch sidesteps the problem:

  $ diff -Naur /usr/sbin/arc_summary.old /usr/sbin/arc_summary
  --- /usr/sbin/arc_summary.old 2022-07-06 10:59:50.752833101 -0400
  +++ /usr/sbin/arc_summary 2022-07-06 10:59:22.449113169 -0400
  @@ -255,6 +255,8 @@
   secs = SECTION_PATHS.values()
   
   for section in secs:
  +if not os.path.exists(PROC_PATH+section):
  +continue
   
   with open(PROC_PATH+section, 'r') as proc_location:
   lines = [line for line in proc_location]

  
  # Additional information
  $ lsb_release -rd
  Description:  Ubuntu 20.04.4 LTS
  Release:  20.04
  $ uname -r
  5.15.0-41-generic
  $ apt-cache policy zfsutils-linux linux-image-generic-hwe-20.04
  zfsutils-linux:
Installed: 0.8.3-1ubuntu12.14
Candidate: 0.8.3-1ubuntu12.14
Version table:
   *** 0.8.3-1ubuntu12.14 500
  500 http://us.archive.ubuntu.com/ubuntu focal-updates/main amd64 
Packages
  100 /var/lib/dpkg/status
   0.8.3-1ubuntu12.9 500
  500 http://security.ubuntu.com/ubuntu focal-security/main amd64 
Packages
   0.8.3-1ubuntu12 500
  500 http://us.archive.ubuntu.com/ubuntu focal/main amd64 Packages
  linux-image-generic-hwe-20.04:
Installed: 5.15.0.41.44~20.04.13
Candidate: 5.15.0.41.44~20.04.13
Version table:
   *** 5.15.0.41.44~20.04.13 400
  400 http://us.archive.ubuntu.com/ubuntu focal-proposed/main amd64 
Packages
  100 /var/lib/dpkg/status
   5.13.0.52.59~20.04.31 500
  500 http://us.archive.ubuntu.com/ubuntu focal-updates/main amd64 
Packages
  500 http://security.ubuntu.com/ubuntu focal-security/main amd64 
Packages
   5.4.0.26.32 500
  500 http://us.archive.ubuntu.com/ubuntu focal/main amd64 Packages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1980848/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1980848] Re: arc_summary doesn't work with HWE kernel 5.15

2022-10-04 Thread Thomas Alexander Frederiksen
I can confirm that the (naive) patch sidesteps the issue, but that it is
otherwise present on all our 5.15/ZFS installs.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1980848

Title:
  arc_summary doesn't work with HWE kernel 5.15

Status in zfs-linux package in Ubuntu:
  Confirmed

Bug description:
  # Issue description

  `arc_summary` no longer works with kernel 5.15. It used to work with
  previous kernel like 5.13.

  # Steps to reproduce

  1) setup 20.04 with HWE kernel 5.15
  2) install `zfsutils-linux`
  3) run `arc_summary`
  $ arc_summary 
  Traceback (most recent call last):
File "/usr/sbin/arc_summary", line 875, in 
  main()
File "/usr/sbin/arc_summary", line 826, in main
  kstats = get_kstats()
File "/usr/sbin/arc_summary", line 259, in get_kstats
  with open(PROC_PATH+section, 'r') as proc_location:
  FileNotFoundError: [Errno 2] No such file or directory: 
'/proc/spl/kstat/zfs/xuio_stats'


  Indeed, the xuio_stats file isn't there anymore:
  $ ll /proc/spl/kstat/zfs/
  total 0
  dr-xr-xr-x 21 root root 0 Jul  6 10:49 ./
  dr-xr-xr-x  4 root root 0 Jul  6 10:49 ../
  -rw-r--r--  1 root root 0 Jul  6 10:49 abdstats
  -rw-r--r--  1 root root 0 Jul  6 10:49 arcstats
  dr-xr-xr-x 20 root root 0 Jul  6 10:49 data/
  -rw---  1 root root 0 Jul  6 10:49 dbgmsg
  -rw---  1 root root 0 Jul  6 10:49 dbufs
  -rw-r--r--  1 root root 0 Jul  6 10:49 dbufstats
  dr-xr-xr-x 70 root root 0 Jul  6 10:49 default/
  -rw-r--r--  1 root root 0 Jul  6 10:49 dmu_tx
  -rw-r--r--  1 root root 0 Jul  6 10:49 dnodestats
  -rw-r--r--  1 root root 0 Jul  6 10:49 fletcher_4_bench
  -rw-r--r--  1 root root 0 Jul  6 10:49 fm
  -rw-r--r--  1 root root 0 Jul  6 10:49 import_progress
  -rw-r--r--  1 root root 0 Jul  6 10:49 metaslab_stats
  -rw-r--r--  1 root root 0 Jul  6 10:49 vdev_cache_stats
  -rw-r--r--  1 root root 0 Jul  6 10:49 vdev_mirror_stats
  -rw-r--r--  1 root root 0 Jul  6 10:49 vdev_raidz_bench
  -rw-r--r--  1 root root 0 Jul  6 10:49 zfetchstats
  -rw-r--r--  1 root root 0 Jul  6 10:49 zil
  -rw-r--r--  1 root root 0 Jul  6 10:49 zstd

  
  # Workaround

  This (naive) patch sidesteps the problem:

  $ diff -Naur /usr/sbin/arc_summary.old /usr/sbin/arc_summary
  --- /usr/sbin/arc_summary.old 2022-07-06 10:59:50.752833101 -0400
  +++ /usr/sbin/arc_summary 2022-07-06 10:59:22.449113169 -0400
  @@ -255,6 +255,8 @@
   secs = SECTION_PATHS.values()
   
   for section in secs:
  +if not os.path.exists(PROC_PATH+section):
  +continue
   
   with open(PROC_PATH+section, 'r') as proc_location:
   lines = [line for line in proc_location]

  
  # Additional information
  $ lsb_release -rd
  Description:  Ubuntu 20.04.4 LTS
  Release:  20.04
  $ uname -r
  5.15.0-41-generic
  $ apt-cache policy zfsutils-linux linux-image-generic-hwe-20.04
  zfsutils-linux:
Installed: 0.8.3-1ubuntu12.14
Candidate: 0.8.3-1ubuntu12.14
Version table:
   *** 0.8.3-1ubuntu12.14 500
  500 http://us.archive.ubuntu.com/ubuntu focal-updates/main amd64 
Packages
  100 /var/lib/dpkg/status
   0.8.3-1ubuntu12.9 500
  500 http://security.ubuntu.com/ubuntu focal-security/main amd64 
Packages
   0.8.3-1ubuntu12 500
  500 http://us.archive.ubuntu.com/ubuntu focal/main amd64 Packages
  linux-image-generic-hwe-20.04:
Installed: 5.15.0.41.44~20.04.13
Candidate: 5.15.0.41.44~20.04.13
Version table:
   *** 5.15.0.41.44~20.04.13 400
  400 http://us.archive.ubuntu.com/ubuntu focal-proposed/main amd64 
Packages
  100 /var/lib/dpkg/status
   5.13.0.52.59~20.04.31 500
  500 http://us.archive.ubuntu.com/ubuntu focal-updates/main amd64 
Packages
  500 http://security.ubuntu.com/ubuntu focal-security/main amd64 
Packages
   5.4.0.26.32 500
  500 http://us.archive.ubuntu.com/ubuntu focal/main amd64 Packages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1980848/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991664] Re: backport dkms fixes to build modules correctly for hwe-5.19+ kernels

2022-10-04 Thread Dimitri John Ledkov
** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: dkms (Ubuntu)
   Status: Fix Released => Triaged

** Also affects: zfs-linux (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to dkms in Ubuntu.
https://bugs.launchpad.net/bugs/1991664

Title:
  backport dkms fixes to build modules correctly for hwe-5.19+ kernels

Status in dkms package in Ubuntu:
  Triaged
Status in linux package in Ubuntu:
  New
Status in zfs-linux package in Ubuntu:
  New
Status in dkms source package in Jammy:
  Triaged
Status in linux source package in Jammy:
  New
Status in zfs-linux source package in Jammy:
  New

Bug description:
  [ Impact ]

   * hwe-5.19 kernel has to be compiled with gcc-12+ for the new
  security kernel config options that have been enabled in that kernel
  (init zero structs).

   * dkms needs to be patched to attempt to use the same compiler as was
  used to build the kernel, specifically use gcc for v5.15 but gcc-12
  for v5.19+ in jammy

   * dkms autopkgtests also need to be improved to ensure there are no
  false negatives when kernel has module under test already built-in at
  the same version.

   * because linux-headers packages in Ubuntu do not depend on a
  toolchain, and it is very hard to correctly depend on a native or
  cross-toolchain, add gcc-12 dependency in the dkms package.

  [ Test Plan ]

   * Retrigger dkms module test for a built-in package of the same
  version as already built into the kernel, for example zfs-linux dkms.
  It should pass.

   * Attempt to build dkms modules against v5.15 kernel and v5.19 kernel
  from proposed. dkms module should be built with gcc and gcc-12
  respectively.

  [ Where problems could occur ]

   * New gcc-12 dependency on the dkms package may result in two
  compilers being installed in the Ubuntu Desktop Live image

   * New gcc-12 dependency may prevent automatic upgrade/installation of
  the dkms package update via unattended upgrades.

  [ Other Info ]
   
   * It is questionable for dkms to depend on any c-compiler, given that a 
module for a given kernel can really be built with the same toolchain and the 
same compiler features.

   * In debian, linux kernel packages ship and extra configuration file
  in the kernel headers, dkms uses said configuration file to use a
  matching compiler, and linux-headers packages depend on the toolchain
  used to build a given kernel. Maybe in the future Ubuntu could
  consider using the same packaging.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dkms/+bug/1991664/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991676] [NEW] linux-hwe-5.4 ADT test failure with linux-hwe-5.4/5.4.0-128.144~18.04.1

2022-10-04 Thread Kleber Sacilotto de Souza
Public bug reported:

This is a scripted bug report about ADT failures while running linux-
hwe-5.4 tests for linux-hwe-5.4/5.4.0-128.144~18.04.1 on bionic. Whether
this is caused by the dep8 tests of the tested source or the kernel has
yet to be determined.

Testing failed on:
amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/amd64/l/linux-hwe-5.4/20220927_140526_1dd12@/log.gz
i386: 
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/i386/l/linux-hwe-5.4/20220927_210812_79517@/log.gz
ppc64el: 
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/ppc64el/l/linux-hwe-5.4/20220927_134302_ed524@/log.gz
s390x: 
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/s390x/l/linux-hwe-5.4/20220927_125818_3215e@/log.gz

** Affects: linux-hwe-5.4 (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: kernel-adt-failure

** Tags added: kernel-adt-failure

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-hwe-5.4 in Ubuntu.
https://bugs.launchpad.net/bugs/1991676

Title:
  linux-hwe-5.4 ADT test failure with linux-
  hwe-5.4/5.4.0-128.144~18.04.1

Status in linux-hwe-5.4 package in Ubuntu:
  New

Bug description:
  This is a scripted bug report about ADT failures while running linux-
  hwe-5.4 tests for linux-hwe-5.4/5.4.0-128.144~18.04.1 on bionic.
  Whether this is caused by the dep8 tests of the tested source or the
  kernel has yet to be determined.

  Testing failed on:
  amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/amd64/l/linux-hwe-5.4/20220927_140526_1dd12@/log.gz
  i386: 
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/i386/l/linux-hwe-5.4/20220927_210812_79517@/log.gz
  ppc64el: 
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/ppc64el/l/linux-hwe-5.4/20220927_134302_ed524@/log.gz
  s390x: 
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/s390x/l/linux-hwe-5.4/20220927_125818_3215e@/log.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-hwe-5.4/+bug/1991676/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991664] Missing required logs.

2022-10-04 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1991664

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

** Changed in: linux (Ubuntu Jammy)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to dkms in Ubuntu.
https://bugs.launchpad.net/bugs/1991664

Title:
  backport dkms fixes to build modules correctly for hwe-5.19+ kernels

Status in dkms package in Ubuntu:
  Triaged
Status in linux package in Ubuntu:
  Incomplete
Status in zfs-linux package in Ubuntu:
  New
Status in dkms source package in Jammy:
  Triaged
Status in linux source package in Jammy:
  Incomplete
Status in zfs-linux source package in Jammy:
  New

Bug description:
  [ Impact ]

   * hwe-5.19 kernel has to be compiled with gcc-12+ for the new
  security kernel config options that have been enabled in that kernel
  (init zero structs).

   * dkms needs to be patched to attempt to use the same compiler as was
  used to build the kernel, specifically use gcc for v5.15 but gcc-12
  for v5.19+ in jammy

   * dkms autopkgtests also need to be improved to ensure there are no
  false negatives when kernel has module under test already built-in at
  the same version.

   * because linux-headers packages in Ubuntu do not depend on a
  toolchain, and it is very hard to correctly depend on a native or
  cross-toolchain, add gcc-12 dependency in the dkms package.

  [ Test Plan ]

   * Retrigger dkms module test for a built-in package of the same
  version as already built into the kernel, for example zfs-linux dkms.
  It should pass.

   * Attempt to build dkms modules against v5.15 kernel and v5.19 kernel
  from proposed. dkms module should be built with gcc and gcc-12
  respectively.

  [ Where problems could occur ]

   * New gcc-12 dependency on the dkms package may result in two
  compilers being installed in the Ubuntu Desktop Live image

   * New gcc-12 dependency may prevent automatic upgrade/installation of
  the dkms package update via unattended upgrades.

  [ Other Info ]
   
   * It is questionable for dkms to depend on any c-compiler, given that a 
module for a given kernel can really be built with the same toolchain and the 
same compiler features.

   * In debian, linux kernel packages ship and extra configuration file
  in the kernel headers, dkms uses said configuration file to use a
  matching compiler, and linux-headers packages depend on the toolchain
  used to build a given kernel. Maybe in the future Ubuntu could
  consider using the same packaging.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dkms/+bug/1991664/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991676] Re: linux-hwe-5.4 ADT test failure with linux-hwe-5.4/5.4.0-128.144~18.04.1

2022-10-04 Thread Kleber Sacilotto de Souza
** Description changed:

- This is a scripted bug report about ADT failures while running linux-
- hwe-5.4 tests for linux-hwe-5.4/5.4.0-128.144~18.04.1 on bionic. Whether
- this is caused by the dep8 tests of the tested source or the kernel has
- yet to be determined.
+ The ADT tests for arm64 kernels in Bionic are failing during the setup
+ phase with the following errors:
  
- Testing failed on:
- amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/amd64/l/linux-hwe-5.4/20220927_140526_1dd12@/log.gz
- i386: 
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/i386/l/linux-hwe-5.4/20220927_210812_79517@/log.gz
- ppc64el: 
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/ppc64el/l/linux-hwe-5.4/20220927_134302_ed524@/log.gz
- s390x: 
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/s390x/l/linux-hwe-5.4/20220927_125818_3215e@/log.gz
+ Setting up grub-efi-arm64-signed (1.173.2~18.04.1+2.04-1ubuntu47.4) ...
+ Installing for arm64-efi platform.
+ grub-install: error: efibootmgr: not found.
+ dpkg: error processing package grub-efi-arm64-signed (--configure):
+  installed grub-efi-arm64-signed package post-installation script subprocess 
returned error exit status 1
+ Setting up libx11-6:arm64 (2:1.6.4-3ubuntu0.5) ...
+ Processing triggers for man-db (2.8.3-2ubuntu0.1) ...
+ Processing triggers for libc-bin (2.27-3ubuntu1.6) ...
+ Errors were encountered while processing:
+  grub-efi-arm64-signed
+ E: Sub-process /usr/bin/dpkg returned an error code (1)
+ blame: 
+ badpkg: testbed setup commands failed with status 100
+ autopkgtest [15:12:03]: ERROR: erroneous package: testbed setup commands 
failed with status 100
+ 
+ ADT test log:
+ 
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/arm64/l/linux-hwe-5.4/20220930_151219_13ac3@/log.gz

** Summary changed:

- linux-hwe-5.4 ADT test failure with linux-hwe-5.4/5.4.0-128.144~18.04.1
+ Package grub-efi-arm64-signed 1.173.2~18.04.1+2.04-1ubuntu47.4 from 
bionic-proposed fails to install/upgrade

** Also affects: grub2-signed (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: grub2-signed (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: linux-hwe-5.4 (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: ubuntu-kernel-tests
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-hwe-5.4 in Ubuntu.
https://bugs.launchpad.net/bugs/1991676

Title:
  Package grub-efi-arm64-signed 1.173.2~18.04.1+2.04-1ubuntu47.4 from
  bionic-proposed fails to install/upgrade (grub-install: error:
  efibootmgr: not found.)

Status in ubuntu-kernel-tests:
  New
Status in grub2-signed package in Ubuntu:
  New
Status in grub2-unsigned package in Ubuntu:
  New
Status in linux-hwe-5.4 package in Ubuntu:
  New
Status in grub2-signed source package in Bionic:
  New
Status in grub2-unsigned source package in Bionic:
  New
Status in linux-hwe-5.4 source package in Bionic:
  New

Bug description:
  The ADT tests for arm64 kernels in Bionic are failing during the setup
  phase with the following errors:

  Setting up grub-efi-arm64-signed (1.173.2~18.04.1+2.04-1ubuntu47.4) ...
  Installing for arm64-efi platform.
  grub-install: error: efibootmgr: not found.
  dpkg: error processing package grub-efi-arm64-signed (--configure):
   installed grub-efi-arm64-signed package post-installation script subprocess 
returned error exit status 1
  Setting up libx11-6:arm64 (2:1.6.4-3ubuntu0.5) ...
  Processing triggers for man-db (2.8.3-2ubuntu0.1) ...
  Processing triggers for libc-bin (2.27-3ubuntu1.6) ...
  Errors were encountered while processing:
   grub-efi-arm64-signed
  E: Sub-process /usr/bin/dpkg returned an error code (1)
  blame: 
  badpkg: testbed setup commands failed with status 100
  autopkgtest [15:12:03]: ERROR: erroneous package: testbed setup commands 
failed with status 100

  ADT test log:
  
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/arm64/l/linux-hwe-5.4/20220930_151219_13ac3@/log.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1991676/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991676] Re: Package grub-efi-arm64-signed 1.173.2~18.04.1+2.04-1ubuntu47.4 from bionic-proposed fails to install/upgrade

2022-10-04 Thread Kleber Sacilotto de Souza
Could this be the same issue as reported in bug 1936857?

** Also affects: grub2-unsigned (Ubuntu)
   Importance: Undecided
   Status: New

** Summary changed:

- Package grub-efi-arm64-signed 1.173.2~18.04.1+2.04-1ubuntu47.4 from 
bionic-proposed fails to install/upgrade
+ Package grub-efi-arm64-signed 1.173.2~18.04.1+2.04-1ubuntu47.4 from 
bionic-proposed fails to install/upgrade (grub-install: error: efibootmgr: not 
found.)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-hwe-5.4 in Ubuntu.
https://bugs.launchpad.net/bugs/1991676

Title:
  Package grub-efi-arm64-signed 1.173.2~18.04.1+2.04-1ubuntu47.4 from
  bionic-proposed fails to install/upgrade (grub-install: error:
  efibootmgr: not found.)

Status in ubuntu-kernel-tests:
  New
Status in grub2-signed package in Ubuntu:
  New
Status in grub2-unsigned package in Ubuntu:
  New
Status in linux-hwe-5.4 package in Ubuntu:
  New
Status in grub2-signed source package in Bionic:
  New
Status in grub2-unsigned source package in Bionic:
  New
Status in linux-hwe-5.4 source package in Bionic:
  New

Bug description:
  The ADT tests for arm64 kernels in Bionic are failing during the setup
  phase with the following errors:

  Setting up grub-efi-arm64-signed (1.173.2~18.04.1+2.04-1ubuntu47.4) ...
  Installing for arm64-efi platform.
  grub-install: error: efibootmgr: not found.
  dpkg: error processing package grub-efi-arm64-signed (--configure):
   installed grub-efi-arm64-signed package post-installation script subprocess 
returned error exit status 1
  Setting up libx11-6:arm64 (2:1.6.4-3ubuntu0.5) ...
  Processing triggers for man-db (2.8.3-2ubuntu0.1) ...
  Processing triggers for libc-bin (2.27-3ubuntu1.6) ...
  Errors were encountered while processing:
   grub-efi-arm64-signed
  E: Sub-process /usr/bin/dpkg returned an error code (1)
  blame: 
  badpkg: testbed setup commands failed with status 100
  autopkgtest [15:12:03]: ERROR: erroneous package: testbed setup commands 
failed with status 100

  ADT test log:
  
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/arm64/l/linux-hwe-5.4/20220930_151219_13ac3@/log.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1991676/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991676] Re: Package grub-efi-arm64-signed 1.173.2~18.04.1+2.04-1ubuntu47.4 from bionic-proposed fails to install/upgrade (grub-install: error: efibootmgr: not found.)

2022-10-04 Thread Dimitri John Ledkov
** Tags added: bionic regression-proposed

** No longer affects: grub2-unsigned (Ubuntu)

** No longer affects: grub2-unsigned (Ubuntu Bionic)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-hwe-5.4 in Ubuntu.
https://bugs.launchpad.net/bugs/1991676

Title:
  Package grub-efi-arm64-signed 1.173.2~18.04.1+2.04-1ubuntu47.4 from
  bionic-proposed fails to install/upgrade (grub-install: error:
  efibootmgr: not found.)

Status in ubuntu-kernel-tests:
  New
Status in grub2-signed package in Ubuntu:
  New
Status in linux-hwe-5.4 package in Ubuntu:
  New
Status in grub2-signed source package in Bionic:
  New
Status in linux-hwe-5.4 source package in Bionic:
  New

Bug description:
  The ADT tests for arm64 kernels in Bionic are failing during the setup
  phase with the following errors:

  Setting up grub-efi-arm64-signed (1.173.2~18.04.1+2.04-1ubuntu47.4) ...
  Installing for arm64-efi platform.
  grub-install: error: efibootmgr: not found.
  dpkg: error processing package grub-efi-arm64-signed (--configure):
   installed grub-efi-arm64-signed package post-installation script subprocess 
returned error exit status 1
  Setting up libx11-6:arm64 (2:1.6.4-3ubuntu0.5) ...
  Processing triggers for man-db (2.8.3-2ubuntu0.1) ...
  Processing triggers for libc-bin (2.27-3ubuntu1.6) ...
  Errors were encountered while processing:
   grub-efi-arm64-signed
  E: Sub-process /usr/bin/dpkg returned an error code (1)
  blame: 
  badpkg: testbed setup commands failed with status 100
  autopkgtest [15:12:03]: ERROR: erroneous package: testbed setup commands 
failed with status 100

  ADT test log:
  
https://autopkgtest.ubuntu.com/results/autopkgtest-bionic/bionic/arm64/l/linux-hwe-5.4/20220930_151219_13ac3@/log.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1991676/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] [NEW] Failure to boot with linux-image-5.19.0-18-generic

2022-10-04 Thread Heinrich Schuchardt
Public bug reported:

Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
--- 
ProblemType: Bug
ApportVersion: 2.23.0-0ubuntu2
Architecture: amd64
CasperMD5CheckResult: pass
CurrentDesktop: KDE
DistroRelease: Ubuntu 22.10
InstallationDate: Installed on 2021-05-26 (495 days ago)
InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
MachineType: System manufacturer System Product Name
NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
Package: linux (not installed)
ProcFB: 0 EFI VGA
ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
RelatedPackageVersions:
 linux-restricted-modules-5.19.0-15-generic N/A
 linux-backports-modules-5.19.0-15-generic  N/A
 linux-firmware 20220923.gitf09bebf3-0ubuntu1
RfKill:
 
Tags:  kinetic uec-images
Uname: Linux 5.19.0-15-generic x86_64
UpgradeStatus: No upgrade log present (probably fresh install)
UserGroups: N/A
_MarkForUpload: True
dmi.bios.date: 02/24/2022
dmi.bios.release: 5.17
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: 4204
dmi.board.asset.tag: Default string
dmi.board.name: PRIME X570-PRO
dmi.board.vendor: ASUSTeK COMPUTER INC.
dmi.board.version: Rev X.0x
dmi.chassis.asset.tag: Default string
dmi.chassis.type: 3
dmi.chassis.vendor: Default string
dmi.chassis.version: Default string
dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
dmi.product.family: To be filled by O.E.M.
dmi.product.name: System Product Name
dmi.product.sku: SKU
dmi.product.version: System Version
dmi.sys.vendor: System manufacturer

** Affects: linux-signed (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: apport-collected kinetic uec-images

** Tags added: apport-collected kinetic uec-images

** Description changed:

- Since the last kernel update today my system stops in the middle of the
- boot process and does not reach KDE.
+ Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
+ --- 
+ ProblemType: Bug
+ ApportVersion: 2.23.0-0ubuntu2
+ Architecture: amd64
+ CasperMD5CheckResult: pass
+ CurrentDesktop: KDE
+ DistroRelease: Ubuntu 22.10
+ InstallationDate: Installed on 2021-05-26 (495 days ago)
+ InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
+ MachineType: System manufacturer System Product Name
+ NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
+ Package: linux (not installed)
+ ProcFB: 0 EFI VGA
+ ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
+ ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
+ PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
+ RelatedPackageVersions:
+  linux-restricted-modules-5.19.0-15-generic N/A
+  linux-backports-modules-5.19.0-15-generic  N/A
+  linux-firmware 20220923.gitf09bebf3-0ubuntu1
+ RfKill:
+  
+ Tags:  kinetic uec-images
+ Uname: Linux 5.19.0-15-generic x86_64
+ UpgradeStatus: No upgrade log present (probably fresh install)
+ UserGroups: N/A
+ _MarkForUpload: True
+ dmi.bios.date: 02/24/2022
+ dmi.bios.release: 5.17
+ dmi.bios.vendor: American Megatrends Inc.
+ dmi.bios.version: 4204
+ dmi.board.asset.tag: Default string
+ dmi.board.name: PRIME X570-PRO
+ dmi.board.vendor: ASUSTeK COMPUTER INC.
+ dmi.board.version: Rev X.0x
+ dmi.chassis.asset.tag: Default string
+ dmi.chassis.type: 3
+ dmi.chassis.vendor: Default string
+ dmi.chassis.version: Default string
+ dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
+ dmi.product.family: To be filled by O.E.M.
+ dmi.product.name: System Product Name
+ dmi.product.sku: SKU
+ dmi.product.version: System Version
+ dmi.sys.vendor: System manufacturer

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  Problem

[Kernel-packages] [Bug 1991703] AlsaInfo.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "AlsaInfo.txt"
   
https://bugs.launchpad.net/bugs/1991703/+attachment/5621162/+files/AlsaInfo.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] CurrentDmesg.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "CurrentDmesg.txt"
   
https://bugs.launchpad.net/bugs/1991703/+attachment/5621165/+files/CurrentDmesg.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] CRDA.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "CRDA.txt"
   https://bugs.launchpad.net/bugs/1991703/+attachment/5621164/+files/CRDA.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] ProcInterrupts.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "ProcInterrupts.txt"
   
https://bugs.launchpad.net/bugs/1991703/+attachment/5621176/+files/ProcInterrupts.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] ProcCpuinfo.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "ProcCpuinfo.txt"
   
https://bugs.launchpad.net/bugs/1991703/+attachment/5621173/+files/ProcCpuinfo.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] ProcCpuinfoMinimal.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "ProcCpuinfoMinimal.txt"
   
https://bugs.launchpad.net/bugs/1991703/+attachment/5621174/+files/ProcCpuinfoMinimal.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] Lsusb.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "Lsusb.txt"
   https://bugs.launchpad.net/bugs/1991703/+attachment/5621169/+files/Lsusb.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] Lsusb-v.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "Lsusb-v.txt"
   
https://bugs.launchpad.net/bugs/1991703/+attachment/5621171/+files/Lsusb-v.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] Lspci-vt.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "Lspci-vt.txt"
   
https://bugs.launchpad.net/bugs/1991703/+attachment/5621168/+files/Lspci-vt.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] Lspci.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "Lspci.txt"
   https://bugs.launchpad.net/bugs/1991703/+attachment/5621167/+files/Lspci.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] IwConfig.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "IwConfig.txt"
   
https://bugs.launchpad.net/bugs/1991703/+attachment/5621166/+files/IwConfig.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] acpidump.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "acpidump.txt"
   
https://bugs.launchpad.net/bugs/1991703/+attachment/5621180/+files/acpidump.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] ProcModules.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "ProcModules.txt"
   
https://bugs.launchpad.net/bugs/1991703/+attachment/5621177/+files/ProcModules.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] WifiSyslog.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "WifiSyslog.txt"
   
https://bugs.launchpad.net/bugs/1991703/+attachment/5621179/+files/WifiSyslog.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] PaInfo.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "PaInfo.txt"
   https://bugs.launchpad.net/bugs/1991703/+attachment/5621172/+files/PaInfo.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] ProcEnviron.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "ProcEnviron.txt"
   
https://bugs.launchpad.net/bugs/1991703/+attachment/5621175/+files/ProcEnviron.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] AudioDevicesInUse.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "AudioDevicesInUse.txt"
   
https://bugs.launchpad.net/bugs/1991703/+attachment/5621163/+files/AudioDevicesInUse.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] UdevDb.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "UdevDb.txt"
   https://bugs.launchpad.net/bugs/1991703/+attachment/5621178/+files/UdevDb.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] Lsusb-t.txt

2022-10-04 Thread Heinrich Schuchardt
apport information

** Attachment added: "Lsusb-t.txt"
   
https://bugs.launchpad.net/bugs/1991703/+attachment/5621170/+files/Lsusb-t.txt

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991704] [NEW] New Kinetic kernel (5.19.0-18-generic) won't boot on Framework laptop

2022-10-04 Thread Jonathan Kamens
Public bug reported:

After today's Kinetic update my Framework laptop won't boot.

The boot hangs after this output:

[0.813802] pci :00:07.0: DPC: RP PIO log size 8 is invalid 0.814786] pci 
:00:07.1: DPC: RP PIO log size 8 is invalid
[0.815754] pci :00:07.2: DPC: RP PIO log size 8 is invalid 0.816732] pci 
:00:07.3: DPC: RP PIO log size 0 is invalid
[2.001649] tpm tpm0: [Firmware Bug]: TPM interrupt not working, polling inst
ead

Falling back to 5.19.0-15-generic works.

My Thinkpad X1 Carbon 6th gen does not have this problem.

ProblemType: Bug
DistroRelease: Ubuntu 22.10
Package: linux-image-5.19.0-15-generic 5.19.0-15.15
ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
Uname: Linux 5.19.0-15-generic x86_64
ApportVersion: 2.23.0-0ubuntu2
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC0:  jik4014 F wireplumber
 /dev/snd/seq:jik4009 F pipewire
CasperMD5CheckResult: pass
CurrentDesktop: ubuntu:GNOME
Date: Tue Oct  4 13:55:09 2022
InstallationDate: Installed on 2022-09-17 (16 days ago)
InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 
(20220809.1)
MachineType: Framework Laptop (12th Gen Intel Core)
ProcFB: 0 i915drmfb
ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/ubuntu--vg-root ro quiet splash
PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
RelatedPackageVersions:
 linux-restricted-modules-5.19.0-15-generic N/A
 linux-backports-modules-5.19.0-15-generic  N/A
 linux-firmware 20220923.gitf09bebf3-0ubuntu1
SourcePackage: linux
UpgradeStatus: Upgraded to kinetic on 2022-10-02 (1 days ago)
dmi.bios.date: 07/15/2022
dmi.bios.release: 3.4
dmi.bios.vendor: INSYDE Corp.
dmi.bios.version: 03.04
dmi.board.asset.tag: *
dmi.board.name: FRANMACP04
dmi.board.vendor: Framework
dmi.board.version: A4
dmi.chassis.asset.tag: FRANDACPA423350021
dmi.chassis.type: 10
dmi.chassis.vendor: Framework
dmi.chassis.version: A4
dmi.modalias: 
dmi:bvnINSYDECorp.:bvr03.04:bd07/15/2022:br3.4:svnFramework:pnLaptop(12thGenIntelCore):pvrA4:rvnFramework:rnFRANMACP04:rvrA4:cvnFramework:ct10:cvrA4:skuFRANDACP04:
dmi.product.family: 13in Laptop
dmi.product.name: Laptop (12th Gen Intel Core)
dmi.product.sku: FRANDACP04
dmi.product.version: A4
dmi.sys.vendor: Framework

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug kinetic wayland-session

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1991704

Title:
  New Kinetic kernel (5.19.0-18-generic) won't boot on Framework laptop

Status in linux package in Ubuntu:
  New

Bug description:
  After today's Kinetic update my Framework laptop won't boot.

  The boot hangs after this output:

  [0.813802] pci :00:07.0: DPC: RP PIO log size 8 is invalid 0.814786] pci 
:00:07.1: DPC: RP PIO log size 8 is invalid
  [0.815754] pci :00:07.2: DPC: RP PIO log size 8 is invalid 0.816732] pci 
:00:07.3: DPC: RP PIO log size 0 is invalid
  [2.001649] tpm tpm0: [Firmware Bug]: TPM interrupt not working, polling inst
  ead

  Falling back to 5.19.0-15-generic works.

  My Thinkpad X1 Carbon 6th gen does not have this problem.

  ProblemType: Bug
  DistroRelease: Ubuntu 22.10
  Package: linux-image-5.19.0-15-generic 5.19.0-15.15
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  Uname: Linux 5.19.0-15-generic x86_64
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jik4014 F wireplumber
   /dev/snd/seq:jik4009 F pipewire
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Tue Oct  4 13:55:09 2022
  InstallationDate: Installed on 2022-09-17 (16 days ago)
  InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 
(20220809.1)
  MachineType: Framework Laptop (12th Gen Intel Core)
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/ubuntu--vg-root ro quiet splash
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  SourcePackage: linux
  UpgradeStatus: Upgraded to kinetic on 2022-10-02 (1 days ago)
  dmi.bios.date: 07/15/2022
  dmi.bios.release: 3.4
  dmi.bios.vendor: INSYDE Corp.
  dmi.bios.version: 03.04
  dmi.board.asset.tag: *
  dmi.board.name: FRANMACP04
  dmi.board.vendor: Framework
  dmi.board.version: A4
  dmi.chassis.asset.tag: FRANDACPA423350021
  dmi.chassis.type: 10
  dmi.chassis.vendor: Framew

[Kernel-packages] [Bug 1991704] Re: New Kinetic kernel (5.19.0-18-generic) won't boot on Framework laptop

2022-10-04 Thread Jonathan Kamens
One difference between my Framework laptop (where the problem is
happening) and my ThinkPad is that the Framework laptop has a separate
Windows boot partition. Don't know if that's relevant, but thought it
worth mentioning just in case.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1991704

Title:
  New Kinetic kernel (5.19.0-18-generic) won't boot on Framework laptop

Status in linux package in Ubuntu:
  New

Bug description:
  After today's Kinetic update my Framework laptop won't boot.

  The boot hangs after this output:

  [0.813802] pci :00:07.0: DPC: RP PIO log size 8 is invalid 0.814786] pci 
:00:07.1: DPC: RP PIO log size 8 is invalid
  [0.815754] pci :00:07.2: DPC: RP PIO log size 8 is invalid 0.816732] pci 
:00:07.3: DPC: RP PIO log size 0 is invalid
  [2.001649] tpm tpm0: [Firmware Bug]: TPM interrupt not working, polling inst
  ead

  Falling back to 5.19.0-15-generic works.

  My Thinkpad X1 Carbon 6th gen does not have this problem.

  ProblemType: Bug
  DistroRelease: Ubuntu 22.10
  Package: linux-image-5.19.0-15-generic 5.19.0-15.15
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  Uname: Linux 5.19.0-15-generic x86_64
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jik4014 F wireplumber
   /dev/snd/seq:jik4009 F pipewire
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Tue Oct  4 13:55:09 2022
  InstallationDate: Installed on 2022-09-17 (16 days ago)
  InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 
(20220809.1)
  MachineType: Framework Laptop (12th Gen Intel Core)
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/ubuntu--vg-root ro quiet splash
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  SourcePackage: linux
  UpgradeStatus: Upgraded to kinetic on 2022-10-02 (1 days ago)
  dmi.bios.date: 07/15/2022
  dmi.bios.release: 3.4
  dmi.bios.vendor: INSYDE Corp.
  dmi.bios.version: 03.04
  dmi.board.asset.tag: *
  dmi.board.name: FRANMACP04
  dmi.board.vendor: Framework
  dmi.board.version: A4
  dmi.chassis.asset.tag: FRANDACPA423350021
  dmi.chassis.type: 10
  dmi.chassis.vendor: Framework
  dmi.chassis.version: A4
  dmi.modalias: 
dmi:bvnINSYDECorp.:bvr03.04:bd07/15/2022:br3.4:svnFramework:pnLaptop(12thGenIntelCore):pvrA4:rvnFramework:rnFRANMACP04:rvrA4:cvnFramework:ct10:cvrA4:skuFRANDACP04:
  dmi.product.family: 13in Laptop
  dmi.product.name: Laptop (12th Gen Intel Core)
  dmi.product.sku: FRANDACP04
  dmi.product.version: A4
  dmi.sys.vendor: Framework

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1991704/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991704] Status changed to Confirmed

2022-10-04 Thread Ubuntu Kernel Bot
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1991704

Title:
  New Kinetic kernel (5.19.0-18-generic) won't boot on Framework laptop

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  After today's Kinetic update my Framework laptop won't boot.

  The boot hangs after this output:

  [0.813802] pci :00:07.0: DPC: RP PIO log size 8 is invalid 0.814786] pci 
:00:07.1: DPC: RP PIO log size 8 is invalid
  [0.815754] pci :00:07.2: DPC: RP PIO log size 8 is invalid 0.816732] pci 
:00:07.3: DPC: RP PIO log size 0 is invalid
  [2.001649] tpm tpm0: [Firmware Bug]: TPM interrupt not working, polling inst
  ead

  Falling back to 5.19.0-15-generic works.

  My Thinkpad X1 Carbon 6th gen does not have this problem.

  ProblemType: Bug
  DistroRelease: Ubuntu 22.10
  Package: linux-image-5.19.0-15-generic 5.19.0-15.15
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  Uname: Linux 5.19.0-15-generic x86_64
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  jik4014 F wireplumber
   /dev/snd/seq:jik4009 F pipewire
  CasperMD5CheckResult: pass
  CurrentDesktop: ubuntu:GNOME
  Date: Tue Oct  4 13:55:09 2022
  InstallationDate: Installed on 2022-09-17 (16 days ago)
  InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 
(20220809.1)
  MachineType: Framework Laptop (12th Gen Intel Core)
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/ubuntu--vg-root ro quiet splash
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  SourcePackage: linux
  UpgradeStatus: Upgraded to kinetic on 2022-10-02 (1 days ago)
  dmi.bios.date: 07/15/2022
  dmi.bios.release: 3.4
  dmi.bios.vendor: INSYDE Corp.
  dmi.bios.version: 03.04
  dmi.board.asset.tag: *
  dmi.board.name: FRANMACP04
  dmi.board.vendor: Framework
  dmi.board.version: A4
  dmi.chassis.asset.tag: FRANDACPA423350021
  dmi.chassis.type: 10
  dmi.chassis.vendor: Framework
  dmi.chassis.version: A4
  dmi.modalias: 
dmi:bvnINSYDECorp.:bvr03.04:bd07/15/2022:br3.4:svnFramework:pnLaptop(12thGenIntelCore):pvrA4:rvnFramework:rnFRANMACP04:rvrA4:cvnFramework:ct10:cvrA4:skuFRANDACP04:
  dmi.product.family: 13in Laptop
  dmi.product.name: Laptop (12th Gen Intel Core)
  dmi.product.sku: FRANDACP04
  dmi.product.version: A4
  dmi.sys.vendor: Framework

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1991704/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1990876] Re: kworker high CPU usage: issue with xhci_hub_control from xhci_pci kernel module

2022-10-04 Thread Albert
Thanks Kai-Heng Feng, I have just tried to use 5.15.0.43-generic and the
issue isn't there: no need to modprobe -r xhci_pci, as there isn't any
kworker pegging a CPU.

So indeed a git bisect or similar approach between kernels .43 and .46
could reveal something. I can't find binaries for kernels in between
using "sudo apt install" in Ubuntu 22.04.

Kernel 5.15.0.43 has other problems though: for example, the touchpad
doesn't work at all.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1990876

Title:
  kworker high CPU usage: issue with xhci_hub_control from xhci_pci
  kernel module

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Using Ubuntu 22.04, as of yesterday night upon rebooting the framework
  laptop (which had not been rebooted for several weeks), the fans come
  on strong and I see, with top, a kworker process at nearly 100% CPU
  utilization, which makes the laptop unusable.

  I have an early Framework laptop with an 11th Gen Intel(R) Core(TM)
  i7-1165G7 @ 2.80GHz.

  I removed all USB-c expansion cards except for one with an USB-c pass
  through, to no avail.

  With perf I have been able to determine that the xhci_hub_control and
  perhaps xhci_bus_suspend are at fault. As a matter of fact, the laptop
  cannot suspend any more, when it was working flawlessly until the
  reboot.

  $ sudo apt install linux-tools-common linux-tools-$(uname -r)
  $ sudo -i
  # echo -1 > /proc/sys/kernel/perf_event_paranoid
  # perf record
  control-c
  # perf report

  Samples: 125K of event 'cycles', Event count (approx.): 142991820424
  Overhead  Command  Shared Object  Symbol
  54.11%  kworker/5:2+usb  [kernel.kallsyms]  [k] xhci_hub_control  
◆
  7.94%  kworker/5:2+usb  [kernel.kallsyms]  [k] xhci_bus_suspend   
   ▒
  0.98%  kworker/5:2+usb  [kernel.kallsyms]  [k] kfree  
   ▒
  0.86%  kworker/5:2+usb  [kernel.kallsyms]  [k] 
_raw_spin_lock_irqsave
  ...

  What can be done to address this issue with a kworker?

  I suspect perhaps the new kernel is at fault. I tried rebooting to the
  prior kernel 5.15.0-47-generic and 5.15.0-46-generic, but with the
  same result.

  What has changed? What can be done about this kworker and the
  xchi_hub_control?

  A temporary solution:

  $ sudo modprobe -r xhci_pci

  … which results in the kworker process disappearing from `top`
  (reduced CPU usage to near zero), the fans wind down, and
  unfortunately the ethernet expansion bay doesn’t work anymore but at
  least wifi does. Keyboard and touchpad also work. And suspend with
  deep also work well, just tested it.

  I assume other expansion bays will stop working too, but the laptop is
  at least charging: the USB-c pass-through works.

  See also:
  
https://community.frame.work/t/kworker-stuck-at-near-100-cpu-usage-with-ubuntu-22-04/23053/2

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: linux-image-5.15.0-48-generic 5.15.0-48.54
  ProcVersionSignature: Ubuntu 5.15.0-48.54-generic 5.15.53
  Uname: Linux 5.15.0-48-generic x86_64
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
  ApportVersion: 2.20.11-0ubuntu82.1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  albert 4870 F pulseaudio
  CasperMD5CheckResult: unknown
  CurrentDesktop: ubuntu:GNOME
  Date: Mon Sep 26 18:14:26 2022
  InstallationDate: Installed on 2022-03-11 (199 days ago)
  InstallationMedia: Ubuntu 20.04.4 LTS "Focal Fossa" - Release amd64 (20220223)
  Lsusb: Error: command ['lsusb'] failed with exit code 1:
  Lsusb-t:
   
  Lsusb-v: Error: command ['lsusb', '-v'] failed with exit code 1:
  MachineType: Framework Laptop
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/BOOT/ubuntu_ezm1f9@/vmlinuz-5.15.0-48-generic 
root=ZFS=rpool/ROOT/ubuntu_ezm1f9 ro quiet splash nvme.noacpi=1 
mem_sleep_default=deep vt.handoff=1
  RelatedPackageVersions:
   linux-restricted-modules-5.15.0-48-generic N/A
   linux-backports-modules-5.15.0-48-generic  N/A
   linux-firmware 20220329.git681281e4-0ubuntu3.5
  RfKill:
   1: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no
  SourcePackage: linux
  UpgradeStatus: Upgraded to jammy on 2022-04-28 (150 days ago)
  dmi.bios.date: 07/19/2022
  dmi.bios.release: 3.16
  dmi.bios.vendor: INSYDE Corp.
  dmi.bios.version: 03.10
  dmi.board.asset.tag: *
  dmi.board.name: FRANBMCP0B
  dmi.board.vendor: Framework
  dmi.board.version: AB
  dmi.chassis.asset.tag: FRANBMCPAB1484011X
  dmi.chassis.type: 10
  dmi.chassis.vendor: Framework
  dmi.chassis.version: AB
  dmi.modalias: 
dmi:bvnINSYDECorp.:bvr03.10:bd07

[Kernel-packages] [Bug 1991703] Re: Failure to boot with linux-image-5.19.0-18-generic

2022-10-04 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: linux-signed (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  Confirmed

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1991703] Re: Failure to boot with linux-image-5.19.0-18-generic

2022-10-04 Thread Heinrich Schuchardt
Could this be a problem with the Nvidia DKMS driver? On a laptop using
the Radeon driver I have no problem.

** Also affects: nvidia-graphics-drivers-515 (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1991703

Title:
  Failure to boot with linux-image-5.19.0-18-generic

Status in linux-signed package in Ubuntu:
  Confirmed
Status in nvidia-graphics-drivers-515 package in Ubuntu:
  New

Bug description:
  Since the last kernel update today my system stops in the middle of the boot 
process and does not reach KDE.
  --- 
  ProblemType: Bug
  ApportVersion: 2.23.0-0ubuntu2
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: KDE
  DistroRelease: Ubuntu 22.10
  InstallationDate: Installed on 2021-05-26 (495 days ago)
  InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
  MachineType: System manufacturer System Product Name
  NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair nvidia_drm 
nvidia_modeset nvidia
  Package: linux (not installed)
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.19.0-15-generic 
root=/dev/mapper/vgkubuntu-root ro default_hugepagesz=1G hugepagesz=1G 
hugepages=4
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-5.19.0-15-generic N/A
   linux-backports-modules-5.19.0-15-generic  N/A
   linux-firmware 20220923.gitf09bebf3-0ubuntu1
  RfKill:
   
  Tags:  kinetic uec-images
  Uname: Linux 5.19.0-15-generic x86_64
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: N/A
  _MarkForUpload: True
  dmi.bios.date: 02/24/2022
  dmi.bios.release: 5.17
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: 4204
  dmi.board.asset.tag: Default string
  dmi.board.name: PRIME X570-PRO
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: Rev X.0x
  dmi.chassis.asset.tag: Default string
  dmi.chassis.type: 3
  dmi.chassis.vendor: Default string
  dmi.chassis.version: Default string
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr4204:bd02/24/2022:br5.17:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnPRIMEX570-PRO:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring:skuSKU:
  dmi.product.family: To be filled by O.E.M.
  dmi.product.name: System Product Name
  dmi.product.sku: SKU
  dmi.product.version: System Version
  dmi.sys.vendor: System manufacturer

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-signed/+bug/1991703/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1990240] Re: To support Intel Maple Ridge Thunderbolt [8086:1134]

2022-10-04 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-oem-6.0/6.0.0-1005.5
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-jammy' to 'verification-done-jammy'. If the
problem still exists, change the tag 'verification-needed-jammy' to
'verification-failed-jammy'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.17 in Ubuntu.
https://bugs.launchpad.net/bugs/1990240

Title:
  To support Intel Maple Ridge Thunderbolt [8086:1134]

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  In Progress
Status in linux-oem-5.17 package in Ubuntu:
  Invalid
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  In Progress
Status in linux-oem-5.17 source package in Jammy:
  Fix Committed
Status in linux-oem-6.0 source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  In Progress
Status in linux-oem-5.17 source package in Kinetic:
  Invalid
Status in linux-oem-6.0 source package in Kinetic:
  Invalid

Bug description:
  [Impact]
  The TBT ID[8086:1134] the new project uses is not listed in the driver.

  [Fix]
  Intel submits this as we requested which is still in linux-next
  https://lore.kernel.org/linux-usb/20220908104320.3409720-1-gil.f...@intel.com/

  [Where problems could occur]
  Adding only one ID, should be pretty safe.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1990240/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1990242] Re: Intel graphic driver is not probing[8086:468b]

2022-10-04 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-oem-6.0/6.0.0-1005.5
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-jammy' to 'verification-done-jammy'. If the
problem still exists, change the tag 'verification-needed-jammy' to
'verification-failed-jammy'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.17 in Ubuntu.
https://bugs.launchpad.net/bugs/1990242

Title:
  Intel graphic driver is not probing[8086:468b]

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  In Progress
Status in linux-oem-5.17 package in Ubuntu:
  Invalid
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  In Progress
Status in linux-oem-5.17 source package in Jammy:
  Fix Committed
Status in linux-oem-6.0 source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  In Progress
Status in linux-oem-5.17 source package in Kinetic:
  Invalid
Status in linux-oem-6.0 source package in Kinetic:
  Invalid

Bug description:
  [Impact]
  Got blank screen after entered desktop

  [Fix]
  Below commit in linux-next fixes the issue.
  6215a7c8f552 drm/i915: Add new ADL-S pci id

  [Test]
  Verified on the target machine.

  [Where problems could occur]
  It only adds an ID to the list, should be pretty safe.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1990242/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1990161] Re: Fix RPL-S support on powercap/intel_rapl

2022-10-04 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-oem-6.0/6.0.0-1005.5
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-jammy' to 'verification-done-jammy'. If the
problem still exists, change the tag 'verification-needed-jammy' to
'verification-failed-jammy'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.17 in Ubuntu.
https://bugs.launchpad.net/bugs/1990161

Title:
  Fix RPL-S support on powercap/intel_rapl

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  In Progress
Status in linux-oem-5.17 package in Ubuntu:
  Invalid
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  In Progress
Status in linux-oem-5.17 source package in Jammy:
  Fix Released
Status in linux-oem-6.0 source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  In Progress
Status in linux-oem-5.17 source package in Kinetic:
  Invalid
Status in linux-oem-6.0 source package in Kinetic:
  Invalid

Bug description:
  [Impact]
  proc_thermal driver is not loaded

  [Fix]
  Add RPL-S id on device id table of powercap/intel_rapl.

  [Test Case]
  1. sudo checkbox-cli run com.canonical.certification::miscellanea/proc_thermal

  [Where problems could occur]
  Low, only add RPL-S id on powercap/intel_rap but may lack of RPL-S features.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1990161/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989518] Re: AMD ACP 6.2 DMIC support

2022-10-04 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-oem-6.0/6.0.0-1005.5
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-jammy' to 'verification-done-jammy'. If the
problem still exists, change the tag 'verification-needed-jammy' to
'verification-failed-jammy'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989518

Title:
  AMD ACP 6.2 DMIC support

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  Fix Released
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Won't Fix
Status in linux-oem-6.0 source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  Fix Released
Status in linux-oem-6.0 source package in Kinetic:
  Invalid

Bug description:
  The patchset will be merged to upstream kernel v6.1, the unstable
  kernel will have the patchset automatically after the v6.1 is ready.

  The oem-5.17 kernel doesn't support this AMD generation platform yet,
  so this patchset is useless for oem-5.17 so far.

  [Impact]
  On the AMD PS platforms, the internal mic can't be detected
  and there is no internal mic for users to use.

  [Fix]
  Backport 13 patches from linux-next kernel to fix this problem.

  [Test]
  boot the patched kernel on the machine, after loging into the
  desktop, open the gnome-sound-setting, there is
  internal mic, and could record sound via internal mic.

  
  [Where problems could occur]
  This only impacts intenal mic support on AMD ps machines, it will
  match the pci device revision and apply the driver according to
  match result, in theory it will not bring regression on non-amd-ps
  machines.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1989518/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1989046] Re: support independent clock and LED GPIOs for Intel IPU6 platforms

2022-10-04 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-oem-6.0/6.0.0-1005.5
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-jammy' to 'verification-done-jammy'. If the
problem still exists, change the tag 'verification-needed-jammy' to
'verification-failed-jammy'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1989046

Title:
  support independent clock and LED GPIOs for Intel IPU6 platforms

Status in linux package in Ubuntu:
  Fix Released
Status in linux-oem-5.17 package in Ubuntu:
  Invalid
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Won't Fix
Status in linux-oem-5.17 source package in Jammy:
  Fix Committed
Status in linux-oem-6.0 source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  Fix Released
Status in linux-oem-5.17 source package in Kinetic:
  Invalid
Status in linux-oem-6.0 source package in Kinetic:
  Invalid

Bug description:
  [SRU Justification]

  [Impact]

  When migrated from power_ctrl_logic driver to int3472, two additional
  independent CLK/LED GPIOs other than powerdown/reset must be probed
  exceptionally.

  [Fix]

  Vendor provided patch in
  
https://github.com/intel/ipu6-drivers/blob/2b8a592dc63e117d8f5af5f32a10d7e0651832d2/patch/int3472-support-independent-clock-and-LED-gpios-5.17+.patch.

  [Test Case]

  Tested on both TGL/ADL platforms against nominated kernels.

  [Where problems could occur]

  This adds exceptional cases with fallbacks to the original function. No
  one else is affected.

  [Other Info]

  This is an essential part for switching from power_ctrl_logic based GPIO
  control mechanism to the generic, upstreamed int3472 driver. Affects all
  IPU6 platforms that are to run new IPU6 driver dump in 202208.

  == original bug report ==

  Per
  
https://github.com/intel/ipu6-drivers/commit/f771bd3cb9f324a393a75e068a039bd1f9611026
  and
  
https://github.com/intel/ipu6-drivers/commit/2b8a592dc63e117d8f5af5f32a10d7e0651832d2,
  additional fix for INT3472 is necessary to probe camera sensor GPIOs
  on Intel IPU6 platforms.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1989046/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988346] Re: cm32181 module error blocking suspend

2022-10-04 Thread Niall Murphy
Unload the module, then suspend succeeds Dmesg.

Reloading the module results in.

[  308.882904] i2c i2c-0: Failed to register i2c client dummy at 0x48 (-16)
[  308.882977] cm32181: probe of i2c-CPLM3218:00 failed with error -16

** Attachment added: "kernel_lp1988346-3_dmesg_03_unload_module_suspend_success"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988346/+attachment/5621235/+files/kernel_lp1988346-3_dmesg_03_unload_module_suspend_success

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988346

Title:
  cm32181 module error blocking suspend

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  After updating to 22.04.1 (from 20.04) suspend gets interrupted and
  the system returns after a few seconds.

  journalctl output
  ```
  Aug 31 19:59:32 nmurphy-laptop kernel: PM: suspend entry (deep)
  Aug 31 19:59:32 nmurphy-laptop kernel: Filesystems sync: 0.044 seconds
  Aug 31 19:59:37 nmurphy-laptop kernel: Freezing user space processes ... 
(elapsed 0.002 seconds) done.
  Aug 31 19:59:37 nmurphy-laptop kernel: OOM killer disabled.
  Aug 31 19:59:37 nmurphy-laptop kernel: Freezing remaining freezable tasks ... 
(elapsed 3.894 seconds) done.
  Aug 31 19:59:37 nmurphy-laptop kernel: printk: Suspending console(s) (use 
no_console_suspend to debug)
  Aug 31 19:59:37 nmurphy-laptop kernel: sd 0:0:0:0: [sda] Synchronizing SCSI 
cache
  Aug 31 19:59:37 nmurphy-laptop kernel: PM: dpm_run_callback(): 
acpi_subsys_suspend+0x0/0x60 returns -121
  Aug 31 19:59:37 nmurphy-laptop kernel: cm32181 i2c-CPLM3218:00: PM: failed to 
suspend: error -121
  Aug 31 19:59:37 nmurphy-laptop kernel: sd 0:0:0:0: [sda] Stopping disk
  Aug 31 19:59:37 nmurphy-laptop kernel: PM: Some devices failed to suspend, or 
early wake event detected
  Aug 31 19:59:37 nmurphy-laptop kernel: sd 0:0:0:0: [sda] Starting disk
  Aug 31 19:59:37 nmurphy-laptop kernel: tpm tpm0: TPM is disabled/deactivated 
(0x6)
  Aug 31 19:59:37 nmurphy-laptop kernel: OOM killer enabled.
  Aug 31 19:59:37 nmurphy-laptop kernel: Restarting tasks ... done.
  Aug 31 19:59:37 nmurphy-laptop bluetoothd[1129]: Controller resume with wake 
event 0x0
  Aug 31 19:59:37 nmurphy-laptop kernel: PM: suspend exit
  Aug 31 19:59:37 nmurphy-laptop kernel: PM: suspend entry (s2idle)
  Aug 31 19:59:37 nmurphy-laptop kernel: Filesystems sync: 0.051 seconds
  Aug 31 19:59:44 nmurphy-laptop kernel: Freezing user space processes ... 
(elapsed 0.005 seconds) done.
  Aug 31 19:59:44 nmurphy-laptop kernel: OOM killer disabled.
  Aug 31 19:59:44 nmurphy-laptop kernel: Freezing remaining freezable tasks ... 
  Aug 31 19:59:44 nmurphy-laptop kernel: psmouse serio2: trackpoint: IBM 
TrackPoint firmware: 0x0e, buttons: 3/3
  Aug 31 19:59:44 nmurphy-laptop kernel: input: TPPS/2 IBM TrackPoint as 
/devices/rmi4-00/rmi4-00.fn03/serio2/input/input196
  Aug 31 19:59:44 nmurphy-laptop kernel: (elapsed 6.917 seconds) done.
  Aug 31 19:59:44 nmurphy-laptop kernel: printk: Suspending console(s) (use 
no_console_suspend to debug)
  Aug 31 19:59:44 nmurphy-laptop kernel: sd 0:0:0:0: [sda] Synchronizing SCSI 
cache
  Aug 31 19:59:44 nmurphy-laptop kernel: PM: dpm_run_callback(): 
acpi_subsys_suspend+0x0/0x60 returns -121
  Aug 31 19:59:44 nmurphy-laptop kernel: cm32181 i2c-CPLM3218:00: PM: failed to 
suspend: error -121
  Aug 31 19:59:44 nmurphy-laptop kernel: sd 0:0:0:0: [sda] Stopping disk
  Aug 31 19:59:44 nmurphy-laptop kernel: PM: Some devices failed to suspend, or 
early wake event detected
  Aug 31 19:59:44 nmurphy-laptop kernel: sd 0:0:0:0: [sda] Starting disk
  Aug 31 19:59:44 nmurphy-laptop kernel: tpm tpm0: TPM is disabled/deactivated 
(0x6)
  Aug 31 19:59:44 nmurphy-laptop kernel: OOM killer enabled.
  Aug 31 19:59:44 nmurphy-laptop kernel: Restarting tasks ... done.
  Aug 31 19:59:44 nmurphy-laptop kernel: PM: suspend exit
  Aug 31 19:59:44 nmurphy-laptop systemd[1]: NetworkManager-dispatcher.service: 
Deactivated successfully.
  Aug 31 19:59:44 nmurphy-laptop bluetoothd[1129]: Controller resume with wake 
event 0x0
  Aug 31 19:59:44 nmurphy-laptop systemd-sleep[65536]: Failed to put system to 
sleep. System resumed again: Remote I/O error
  Aug 31 19:59:44 nmurphy-laptop systemd-sleep[65624]: /dev/sda:
  Aug 31 19:59:44 nmurphy-laptop systemd-sleep[65624]:  setting Advanced Power 
Management level to 0xfe (254)
  Aug 31 19:59:44 nmurphy-laptop systemd-sleep[65624]:  APM_level= 254
  Aug 31 19:59:44 nmurphy-laptop NetworkManager[1131]:   
[1661972384.8203] audit: op="radio-control" arg="wwan-enabled:off" pid=65646 
uid=0 result="success"
  Aug 31 19:59:44 nmurphy-laptop systemd[1]: systemd-suspend.service: Main 
process exited, code=exited, status=1/FAILURE
  Aug 31 19:59:44 nmurphy-laptop systemd[1]: systemd-suspend.service: Failed 
with result 'exit-code'.
  Aug 31 19:59:44 nmurphy-laptop systemd[1]: Failed to start System Suspend.
  Aug 31 19:59:44 n

[Kernel-packages] [Bug 1988461] Re: intel_pmc_core not load on Raptor Lake

2022-10-04 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-oem-6.0/6.0.0-1005.5
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-jammy' to 'verification-done-jammy'. If the
problem still exists, change the tag 'verification-needed-jammy' to
'verification-failed-jammy'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.17 in Ubuntu.
https://bugs.launchpad.net/bugs/1988461

Title:
  intel_pmc_core not load on Raptor Lake

Status in HWE Next:
  New
Status in linux package in Ubuntu:
  In Progress
Status in linux-oem-5.17 package in Ubuntu:
  Invalid
Status in linux-oem-6.0 package in Ubuntu:
  Invalid
Status in linux source package in Jammy:
  Won't Fix
Status in linux-oem-5.17 source package in Jammy:
  Fix Released
Status in linux-oem-6.0 source package in Jammy:
  Fix Committed
Status in linux source package in Kinetic:
  In Progress
Status in linux-oem-5.17 source package in Kinetic:
  Invalid
Status in linux-oem-6.0 source package in Kinetic:
  Invalid

Bug description:
  [Summary]
  intel_pmc_core not load on Raptor Lake

  [Reproduce Steps]
  1. Boot into Ubuntu desktop
  2. Check if /sys/kernel/debug/pmc_core folder exist

  [Results]
  Expected: folder /sys/kernel/debug/pmc_core folder been created
  Actual: /sys/kernel/debug/pmc_core not exist

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1988461/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988346] Re: cm32181 module error blocking suspend

2022-10-04 Thread Niall Murphy
Suspend Fail Dmesg

** Attachment added: "kernel_lp1988346-3_dmesg_02_suspend_fail_with_module"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988346/+attachment/5621234/+files/kernel_lp1988346-3_dmesg_02_suspend_fail_with_module

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988346

Title:
  cm32181 module error blocking suspend

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  After updating to 22.04.1 (from 20.04) suspend gets interrupted and
  the system returns after a few seconds.

  journalctl output
  ```
  Aug 31 19:59:32 nmurphy-laptop kernel: PM: suspend entry (deep)
  Aug 31 19:59:32 nmurphy-laptop kernel: Filesystems sync: 0.044 seconds
  Aug 31 19:59:37 nmurphy-laptop kernel: Freezing user space processes ... 
(elapsed 0.002 seconds) done.
  Aug 31 19:59:37 nmurphy-laptop kernel: OOM killer disabled.
  Aug 31 19:59:37 nmurphy-laptop kernel: Freezing remaining freezable tasks ... 
(elapsed 3.894 seconds) done.
  Aug 31 19:59:37 nmurphy-laptop kernel: printk: Suspending console(s) (use 
no_console_suspend to debug)
  Aug 31 19:59:37 nmurphy-laptop kernel: sd 0:0:0:0: [sda] Synchronizing SCSI 
cache
  Aug 31 19:59:37 nmurphy-laptop kernel: PM: dpm_run_callback(): 
acpi_subsys_suspend+0x0/0x60 returns -121
  Aug 31 19:59:37 nmurphy-laptop kernel: cm32181 i2c-CPLM3218:00: PM: failed to 
suspend: error -121
  Aug 31 19:59:37 nmurphy-laptop kernel: sd 0:0:0:0: [sda] Stopping disk
  Aug 31 19:59:37 nmurphy-laptop kernel: PM: Some devices failed to suspend, or 
early wake event detected
  Aug 31 19:59:37 nmurphy-laptop kernel: sd 0:0:0:0: [sda] Starting disk
  Aug 31 19:59:37 nmurphy-laptop kernel: tpm tpm0: TPM is disabled/deactivated 
(0x6)
  Aug 31 19:59:37 nmurphy-laptop kernel: OOM killer enabled.
  Aug 31 19:59:37 nmurphy-laptop kernel: Restarting tasks ... done.
  Aug 31 19:59:37 nmurphy-laptop bluetoothd[1129]: Controller resume with wake 
event 0x0
  Aug 31 19:59:37 nmurphy-laptop kernel: PM: suspend exit
  Aug 31 19:59:37 nmurphy-laptop kernel: PM: suspend entry (s2idle)
  Aug 31 19:59:37 nmurphy-laptop kernel: Filesystems sync: 0.051 seconds
  Aug 31 19:59:44 nmurphy-laptop kernel: Freezing user space processes ... 
(elapsed 0.005 seconds) done.
  Aug 31 19:59:44 nmurphy-laptop kernel: OOM killer disabled.
  Aug 31 19:59:44 nmurphy-laptop kernel: Freezing remaining freezable tasks ... 
  Aug 31 19:59:44 nmurphy-laptop kernel: psmouse serio2: trackpoint: IBM 
TrackPoint firmware: 0x0e, buttons: 3/3
  Aug 31 19:59:44 nmurphy-laptop kernel: input: TPPS/2 IBM TrackPoint as 
/devices/rmi4-00/rmi4-00.fn03/serio2/input/input196
  Aug 31 19:59:44 nmurphy-laptop kernel: (elapsed 6.917 seconds) done.
  Aug 31 19:59:44 nmurphy-laptop kernel: printk: Suspending console(s) (use 
no_console_suspend to debug)
  Aug 31 19:59:44 nmurphy-laptop kernel: sd 0:0:0:0: [sda] Synchronizing SCSI 
cache
  Aug 31 19:59:44 nmurphy-laptop kernel: PM: dpm_run_callback(): 
acpi_subsys_suspend+0x0/0x60 returns -121
  Aug 31 19:59:44 nmurphy-laptop kernel: cm32181 i2c-CPLM3218:00: PM: failed to 
suspend: error -121
  Aug 31 19:59:44 nmurphy-laptop kernel: sd 0:0:0:0: [sda] Stopping disk
  Aug 31 19:59:44 nmurphy-laptop kernel: PM: Some devices failed to suspend, or 
early wake event detected
  Aug 31 19:59:44 nmurphy-laptop kernel: sd 0:0:0:0: [sda] Starting disk
  Aug 31 19:59:44 nmurphy-laptop kernel: tpm tpm0: TPM is disabled/deactivated 
(0x6)
  Aug 31 19:59:44 nmurphy-laptop kernel: OOM killer enabled.
  Aug 31 19:59:44 nmurphy-laptop kernel: Restarting tasks ... done.
  Aug 31 19:59:44 nmurphy-laptop kernel: PM: suspend exit
  Aug 31 19:59:44 nmurphy-laptop systemd[1]: NetworkManager-dispatcher.service: 
Deactivated successfully.
  Aug 31 19:59:44 nmurphy-laptop bluetoothd[1129]: Controller resume with wake 
event 0x0
  Aug 31 19:59:44 nmurphy-laptop systemd-sleep[65536]: Failed to put system to 
sleep. System resumed again: Remote I/O error
  Aug 31 19:59:44 nmurphy-laptop systemd-sleep[65624]: /dev/sda:
  Aug 31 19:59:44 nmurphy-laptop systemd-sleep[65624]:  setting Advanced Power 
Management level to 0xfe (254)
  Aug 31 19:59:44 nmurphy-laptop systemd-sleep[65624]:  APM_level= 254
  Aug 31 19:59:44 nmurphy-laptop NetworkManager[1131]:   
[1661972384.8203] audit: op="radio-control" arg="wwan-enabled:off" pid=65646 
uid=0 result="success"
  Aug 31 19:59:44 nmurphy-laptop systemd[1]: systemd-suspend.service: Main 
process exited, code=exited, status=1/FAILURE
  Aug 31 19:59:44 nmurphy-laptop systemd[1]: systemd-suspend.service: Failed 
with result 'exit-code'.
  Aug 31 19:59:44 nmurphy-laptop systemd[1]: Failed to start System Suspend.
  Aug 31 19:59:44 nmurphy-laptop systemd[1]: Dependency failed for Suspend.
  Aug 31 19:59:44 nmurphy-laptop systemd[1]: suspend.target: Job 
suspend.target/start failed with result 'dependency'.
  Aug 31 19:59:44 nmurphy-laptop systemd[1]:

[Kernel-packages] [Bug 1980861] Re: Please enable CONFIG_SQUASHFS_DECOMP_MULTI_PERCPU

2022-10-04 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-oem-6.0/6.0.0-1005.5
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-jammy' to 'verification-done-jammy'. If the
problem still exists, change the tag 'verification-needed-jammy' to
'verification-failed-jammy'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1980861

Title:
  Please enable CONFIG_SQUASHFS_DECOMP_MULTI_PERCPU

Status in Snappy:
  New
Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Kinetic:
  Fix Released

Bug description:
  The snapd/desktop/advocacy team are investigating the startup
  performance of running snaps.

  While doing this and comparing various distros (fedora, opensuse,
  ubuntu) on Igors reference hardware we noticed that fedora is
  substantially faster at starting snaps.

  After some research it turns out that they use the
  CONFIG_SQUASHFS_DECOMP_MULTI_PERCPU=y option when we use
  CONFIG_SQUASHFS_DECOMP_SINGLE.

  I build^Whacked a test kernel in my ppa:mvo/tmp PPA that just changes
  this one option (https://paste.ubuntu.com/p/NvS4GQjnSp/) and with that
  the first run firefox startup went from 15s to 6s (!) on Igors
  reference hardware. Given the dramatic performance improvements we
  would like to get this option switched.

  However we need to be careful and double check that the results from
  https://bugs.launchpad.net/snappy/+bug/1636847 are no longer an issue
  - back in 2016 the kernel team swtich to _DECOMP_SINGLE because just
  mounting a snap would use up 131Mb or memory(!).

To manage notifications about this bug go to:
https://bugs.launchpad.net/snappy/+bug/1980861/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1988346] Re: cm32181 module error blocking suspend

2022-10-04 Thread Niall Murphy
Boot Dmesg

** Attachment added: "kernel_lp1988346-3_dmesg_01_boot"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1988346/+attachment/5621233/+files/kernel_lp1988346-3_dmesg_01_boot

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988346

Title:
  cm32181 module error blocking suspend

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  After updating to 22.04.1 (from 20.04) suspend gets interrupted and
  the system returns after a few seconds.

  journalctl output
  ```
  Aug 31 19:59:32 nmurphy-laptop kernel: PM: suspend entry (deep)
  Aug 31 19:59:32 nmurphy-laptop kernel: Filesystems sync: 0.044 seconds
  Aug 31 19:59:37 nmurphy-laptop kernel: Freezing user space processes ... 
(elapsed 0.002 seconds) done.
  Aug 31 19:59:37 nmurphy-laptop kernel: OOM killer disabled.
  Aug 31 19:59:37 nmurphy-laptop kernel: Freezing remaining freezable tasks ... 
(elapsed 3.894 seconds) done.
  Aug 31 19:59:37 nmurphy-laptop kernel: printk: Suspending console(s) (use 
no_console_suspend to debug)
  Aug 31 19:59:37 nmurphy-laptop kernel: sd 0:0:0:0: [sda] Synchronizing SCSI 
cache
  Aug 31 19:59:37 nmurphy-laptop kernel: PM: dpm_run_callback(): 
acpi_subsys_suspend+0x0/0x60 returns -121
  Aug 31 19:59:37 nmurphy-laptop kernel: cm32181 i2c-CPLM3218:00: PM: failed to 
suspend: error -121
  Aug 31 19:59:37 nmurphy-laptop kernel: sd 0:0:0:0: [sda] Stopping disk
  Aug 31 19:59:37 nmurphy-laptop kernel: PM: Some devices failed to suspend, or 
early wake event detected
  Aug 31 19:59:37 nmurphy-laptop kernel: sd 0:0:0:0: [sda] Starting disk
  Aug 31 19:59:37 nmurphy-laptop kernel: tpm tpm0: TPM is disabled/deactivated 
(0x6)
  Aug 31 19:59:37 nmurphy-laptop kernel: OOM killer enabled.
  Aug 31 19:59:37 nmurphy-laptop kernel: Restarting tasks ... done.
  Aug 31 19:59:37 nmurphy-laptop bluetoothd[1129]: Controller resume with wake 
event 0x0
  Aug 31 19:59:37 nmurphy-laptop kernel: PM: suspend exit
  Aug 31 19:59:37 nmurphy-laptop kernel: PM: suspend entry (s2idle)
  Aug 31 19:59:37 nmurphy-laptop kernel: Filesystems sync: 0.051 seconds
  Aug 31 19:59:44 nmurphy-laptop kernel: Freezing user space processes ... 
(elapsed 0.005 seconds) done.
  Aug 31 19:59:44 nmurphy-laptop kernel: OOM killer disabled.
  Aug 31 19:59:44 nmurphy-laptop kernel: Freezing remaining freezable tasks ... 
  Aug 31 19:59:44 nmurphy-laptop kernel: psmouse serio2: trackpoint: IBM 
TrackPoint firmware: 0x0e, buttons: 3/3
  Aug 31 19:59:44 nmurphy-laptop kernel: input: TPPS/2 IBM TrackPoint as 
/devices/rmi4-00/rmi4-00.fn03/serio2/input/input196
  Aug 31 19:59:44 nmurphy-laptop kernel: (elapsed 6.917 seconds) done.
  Aug 31 19:59:44 nmurphy-laptop kernel: printk: Suspending console(s) (use 
no_console_suspend to debug)
  Aug 31 19:59:44 nmurphy-laptop kernel: sd 0:0:0:0: [sda] Synchronizing SCSI 
cache
  Aug 31 19:59:44 nmurphy-laptop kernel: PM: dpm_run_callback(): 
acpi_subsys_suspend+0x0/0x60 returns -121
  Aug 31 19:59:44 nmurphy-laptop kernel: cm32181 i2c-CPLM3218:00: PM: failed to 
suspend: error -121
  Aug 31 19:59:44 nmurphy-laptop kernel: sd 0:0:0:0: [sda] Stopping disk
  Aug 31 19:59:44 nmurphy-laptop kernel: PM: Some devices failed to suspend, or 
early wake event detected
  Aug 31 19:59:44 nmurphy-laptop kernel: sd 0:0:0:0: [sda] Starting disk
  Aug 31 19:59:44 nmurphy-laptop kernel: tpm tpm0: TPM is disabled/deactivated 
(0x6)
  Aug 31 19:59:44 nmurphy-laptop kernel: OOM killer enabled.
  Aug 31 19:59:44 nmurphy-laptop kernel: Restarting tasks ... done.
  Aug 31 19:59:44 nmurphy-laptop kernel: PM: suspend exit
  Aug 31 19:59:44 nmurphy-laptop systemd[1]: NetworkManager-dispatcher.service: 
Deactivated successfully.
  Aug 31 19:59:44 nmurphy-laptop bluetoothd[1129]: Controller resume with wake 
event 0x0
  Aug 31 19:59:44 nmurphy-laptop systemd-sleep[65536]: Failed to put system to 
sleep. System resumed again: Remote I/O error
  Aug 31 19:59:44 nmurphy-laptop systemd-sleep[65624]: /dev/sda:
  Aug 31 19:59:44 nmurphy-laptop systemd-sleep[65624]:  setting Advanced Power 
Management level to 0xfe (254)
  Aug 31 19:59:44 nmurphy-laptop systemd-sleep[65624]:  APM_level= 254
  Aug 31 19:59:44 nmurphy-laptop NetworkManager[1131]:   
[1661972384.8203] audit: op="radio-control" arg="wwan-enabled:off" pid=65646 
uid=0 result="success"
  Aug 31 19:59:44 nmurphy-laptop systemd[1]: systemd-suspend.service: Main 
process exited, code=exited, status=1/FAILURE
  Aug 31 19:59:44 nmurphy-laptop systemd[1]: systemd-suspend.service: Failed 
with result 'exit-code'.
  Aug 31 19:59:44 nmurphy-laptop systemd[1]: Failed to start System Suspend.
  Aug 31 19:59:44 nmurphy-laptop systemd[1]: Dependency failed for Suspend.
  Aug 31 19:59:44 nmurphy-laptop systemd[1]: suspend.target: Job 
suspend.target/start failed with result 'dependency'.
  Aug 31 19:59:44 nmurphy-laptop systemd[1]: Stopped target Sleep.
  Aug 31 19:59:44 nmurphy

[Kernel-packages] [Bug 1991717] [NEW] Jammy update: v5.15.64 upstream stable release

2022-10-04 Thread Kamal Mostafa
Public bug reported:

SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree or
   a minimally backported form of that patch. The following upstream
   stable patches should be included in the Ubuntu kernel:

   v5.15.64 upstream stable release
   from git://git.kernel.org/

wifi: rtlwifi: remove always-true condition pointed out by GCC 12
eth: sun: cassini: remove dead code
audit: fix potential double free on error path from fsnotify_add_inode_mark
cgroup: Fix race condition at rebind_subsystems()
parisc: Make CONFIG_64BIT available for ARCH=parisc64 only
parisc: Fix exception handler for fldw and fstw instructions
kernel/sys_ni: add compat entry for fadvise64_64
x86/entry: Move CLD to the start of the idtentry macro
block: add a bdev_max_zone_append_sectors helper
block: add bdev_max_segments() helper
btrfs: zoned: revive max_zone_append_bytes
btrfs: replace BTRFS_MAX_EXTENT_SIZE with fs_info->max_extent_size
btrfs: convert count_max_extents() to use fs_info->max_extent_size
Input: i8042 - move __initconst to fix code styling warning
Input: i8042 - merge quirk tables
Input: i8042 - add TUXEDO devices to i8042 quirk tables
Input: i8042 - add additional TUXEDO devices to i8042 quirk tables
drivers/base: fix userspace break from using bin_attributes for cpumap and 
cpulist
scsi: qla2xxx: Fix response queue handler reading stale packets
scsi: qla2xxx: edif: Fix dropped IKE message
btrfs: put initial index value of a directory in a constant
btrfs: pass the dentry to btrfs_log_new_name() instead of the inode
btrfs: remove unnecessary parameter delalloc_start for writepage_delalloc()
riscv: lib: uaccess: fold fixups into body
riscv: lib: uaccess: fix CSR_STATUS SR_SUM bit
xfrm: fix refcount leak in __xfrm_policy_check()
xfrm: clone missing x->lastused in xfrm_do_migrate
af_key: Do not call xfrm_probe_algs in parallel
xfrm: policy: fix metadata dst->dev xmit null pointer dereference
fs: require CAP_SYS_ADMIN in target namespace for idmapped mounts
net: use eth_hw_addr_set() instead of ether_addr_copy()
Revert "net: macsec: update SCI upon MAC address change."
NFS: Don't allocate nfs_fattr on the stack in __nfs42_ssc_open()
NFSv4.2 fix problems with __nfs42_ssc_open
SUNRPC: RPC level errors should set task->tk_rpc_status
mm/smaps: don't access young/dirty bit if pte unpresent
ntfs: fix acl handling
rose: check NULL rose_loopback_neigh->loopback
r8152: fix the units of some registers for RTL8156A
r8152: fix the RX FIFO settings when suspending
nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout
ice: xsk: Force rings to be sized to power of 2
ice: xsk: prohibit usage of non-balanced queue id
net/mlx5e: Properly disable vlan strip on non-UL reps
net/mlx5: Avoid false positive lockdep warning by adding lock_class_key
net/mlx5e: Fix wrong application of the LRO state
net/mlx5e: Fix wrong tc flag used when set hw-tc-offload off
net: ipa: don't assume SMEM is page-aligned
net: phy: Don't WARN for PHY_READY state in mdio_bus_phy_resume()
net: moxa: get rid of asymmetry in DMA mapping/unmapping
bonding: 802.3ad: fix no transmission of LACPDUs
net: ipvtap - add __init/__exit annotations to module init/exit funcs
netfilter: ebtables: reject blobs that don't provide all entry points
bnxt_en: fix NQ resource accounting during vf creation on 57500 chips
netfilter: nf_tables: disallow updates of implicit chain
netfilter: nf_tables: make table handle allocation per-netns friendly
netfilter: nft_payload: report ERANGE for too long offset and length
netfilter: nft_payload: do not truncate csum_offset and csum_type
netfilter: nf_tables: do not leave chain stats enabled on error
netfilter: nft_osf: restrict osf to ipv4, ipv6 and inet families
netfilter: nft_tunnel: restrict it to netdev family
netfilter: nf_tables: consolidate rule verdict trace call
netfilter: nft_cmp: optimize comparison for 16-bytes
netfilter: bitwise: improve error goto labels
netfilter: nf_tables: upfront validation of data via nft_data_init()
netfilter: nf_tables: disallow jump to implicit chain from set element
netfilter: nf_tables: disallow binding to already bound chain
netfilter: flowtable: add function to invoke garbage collection immediately
netfilter: flowtable: fix stuck flows on cleanup due to pending work
net: Fix data-races around sysctl_[rw]mem_(max|default).
net: Fix data-races around weight_p and dev_weight_[rt]x_bias.
net: Fix data-races around netdev_max_backlog.
net: Fix data-races around netdev_tstamp_prequeue.
ratelimit: Fix data-races in ___ratelimit().
net: Fix data-races around sysctl_optmem_max.
net: Fix a data-race around sysctl_tstamp_allow_data.
net: Fix a data-race around sysctl_net_busy_poll.
net: Fix a data-race around sysctl_net_busy_read.
net: Fix a data-

[Kernel-packages] [Bug 1991717] Re: Jammy update: v5.15.64 upstream stable release

2022-10-04 Thread Kamal Mostafa
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+    v5.15.64 upstream stable release
+    from git://git.kernel.org/
  
-v5.15.64 upstream stable release
-from git://git.kernel.org/
+ wifi: rtlwifi: remove always-true condition pointed out by GCC 12
+ eth: sun: cassini: remove dead code
+ audit: fix potential double free on error path from fsnotify_add_inode_mark
+ cgroup: Fix race condition at rebind_subsystems()
+ parisc: Make CONFIG_64BIT available for ARCH=parisc64 only
+ parisc: Fix exception handler for fldw and fstw instructions
+ kernel/sys_ni: add compat entry for fadvise64_64
+ x86/entry: Move CLD to the start of the idtentry macro
+ block: add a bdev_max_zone_append_sectors helper
+ block: add bdev_max_segments() helper
+ btrfs: zoned: revive max_zone_append_bytes
+ btrfs: replace BTRFS_MAX_EXTENT_SIZE with fs_info->max_extent_size
+ btrfs: convert count_max_extents() to use fs_info->max_extent_size
+ Input: i8042 - move __initconst to fix code styling warning
+ Input: i8042 - merge quirk tables
+ Input: i8042 - add TUXEDO devices to i8042 quirk tables
+ Input: i8042 - add additional TUXEDO devices to i8042 quirk tables
+ drivers/base: fix userspace break from using bin_attributes for cpumap and 
cpulist
+ scsi: qla2xxx: Fix response queue handler reading stale packets
+ scsi: qla2xxx: edif: Fix dropped IKE message
+ btrfs: put initial index value of a directory in a constant
+ btrfs: pass the dentry to btrfs_log_new_name() instead of the inode
+ btrfs: remove unnecessary parameter delalloc_start for writepage_delalloc()
+ riscv: lib: uaccess: fold fixups into body
+ riscv: lib: uaccess: fix CSR_STATUS SR_SUM bit
+ xfrm: fix refcount leak in __xfrm_policy_check()
+ xfrm: clone missing x->lastused in xfrm_do_migrate
+ af_key: Do not call xfrm_probe_algs in parallel
+ xfrm: policy: fix metadata dst->dev xmit null pointer dereference
+ fs: require CAP_SYS_ADMIN in target namespace for idmapped mounts
+ net: use eth_hw_addr_set() instead of ether_addr_copy()
+ Revert "net: macsec: update SCI upon MAC address change."
+ NFS: Don't allocate nfs_fattr on the stack in __nfs42_ssc_open()
+ NFSv4.2 fix problems with __nfs42_ssc_open
+ SUNRPC: RPC level errors should set task->tk_rpc_status
+ mm/smaps: don't access young/dirty bit if pte unpresent
+ ntfs: fix acl handling
+ rose: check NULL rose_loopback_neigh->loopback
+ r8152: fix the units of some registers for RTL8156A
+ r8152: fix the RX FIFO settings when suspending
+ nfc: pn533: Fix use-after-free bugs caused by pn532_cmd_timeout
+ ice: xsk: Force rings to be sized to power of 2
+ ice: xsk: prohibit usage of non-balanced queue id
+ net/mlx5e: Properly disable vlan strip on non-UL reps
+ net/mlx5: Avoid false positive lockdep warning by adding lock_class_key
+ net/mlx5e: Fix wrong application of the LRO state
+ net/mlx5e: Fix wrong tc flag used when set hw-tc-offload off
+ net: ipa: don't assume SMEM is page-aligned
+ net: phy: Don't WARN for PHY_READY state in mdio_bus_phy_resume()
+ net: moxa: get rid of asymmetry in DMA mapping/unmapping
+ bonding: 802.3ad: fix no transmission of LACPDUs
+ net: ipvtap - add __init/__exit annotations to module init/exit funcs
+ netfilter: ebtables: reject blobs that don't provide all entry points
+ bnxt_en: fix NQ resource accounting during vf creation on 57500 chips
+ netfilter: nf_tables: disallow updates of implicit chain
+ netfilter: nf_tables: make table handle allocation per-netns friendly
+ netfilter: nft_payload: report ERANGE for too long offset and length
+ netfilter: nft_payload: do not truncate csum_offset and csum_type
+ netfilter: nf_tables: do not leave chain stats enabled on error
+ netfilter: nft_osf: restrict osf to ipv4, ipv6 and inet families
+ netfilter: nft_tunnel: restrict it to netdev family
+ netfilter: nf_tables: consolidate rule verdict trace call
+ netfilter: nft_cmp: optimize comparison for 16-bytes
+ netfilter: bitwise: improve error goto labels
+ netfilter: nf_tables: upfront validation of data via nft_data_init()
+ netfilter: nf_tables: disallow jump to implicit chain

[Kernel-packages] [Bug 1786013] Autopkgtest regression report (linux-meta-oem-6.0/6.0.0.1005.5)

2022-10-04 Thread Ubuntu SRU Bot
All autopkgtests for the newly accepted linux-meta-oem-6.0 (6.0.0.1005.5) for 
jammy have finished running.
The following regressions have been reported in tests triggered by the package:

systemd/249.11-0ubuntu3.6 (amd64)


Please visit the excuses page listed below and investigate the failures, 
proceeding afterwards as per the StableReleaseUpdates policy regarding 
autopkgtest regressions [1].

https://people.canonical.com/~ubuntu-archive/proposed-
migration/jammy/update_excuses.html#linux-meta-oem-6.0

[1] https://wiki.ubuntu.com/StableReleaseUpdates#Autopkgtest_Regressions

Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1786013

Title:
  Packaging resync

Status in linux package in Ubuntu:
  Fix Released
Status in linux-azure package in Ubuntu:
  Fix Released
Status in linux-azure-edge package in Ubuntu:
  Fix Released
Status in linux source package in Precise:
  Fix Released
Status in linux-azure source package in Precise:
  Won't Fix
Status in linux-azure-edge source package in Precise:
  Won't Fix
Status in linux source package in Trusty:
  Fix Released
Status in linux-azure source package in Trusty:
  Fix Released
Status in linux-azure-edge source package in Trusty:
  Won't Fix
Status in linux source package in Xenial:
  Fix Released
Status in linux-azure source package in Xenial:
  Fix Released
Status in linux-azure-edge source package in Xenial:
  Fix Released
Status in linux source package in Bionic:
  Fix Released
Status in linux-azure source package in Bionic:
  Fix Released
Status in linux-azure-edge source package in Bionic:
  Fix Released
Status in linux source package in Cosmic:
  Fix Released
Status in linux-azure source package in Cosmic:
  Fix Released
Status in linux-azure-edge source package in Cosmic:
  Won't Fix
Status in linux source package in Disco:
  Fix Released
Status in linux-azure source package in Disco:
  Fix Released
Status in linux-azure-edge source package in Disco:
  Won't Fix

Bug description:
  Ongoing packing resyncs.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1786013/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1973676] Re: flickering and black screen from boot time, no more display after 22.04 upgrade

2022-10-04 Thread David Bellot
** Description changed:

- On an HP x360 Spectre (i7-8565U WhiskeyLake-U GT2 [UHD Graphics 620]),
- after upgrading to 22.04 from 21.10, the display goes to some flickering
- lines in black and grey or colors (remember the artifacts on Amstrad CPC
- or C64 when loading from a tape? Same here...).
+ On an HP x360 Spectre (i7-8565U WhiskeyLake-U GT2 [UHD Graphics 620]), after 
upgrading from 21.10 to 22.04, at boot time just after grub, the kernel 
displays some errors messages then goes to black.
+ I configure my machine with an encrypted filesystem and before it was going 
to the splash screen and asking for the partition password.
+ If I type in the password, it seems to boot but the screen stays black 
forever.
  
- After the initial grub menu, the kernel loads and boots. There are a few
- lines of log when the screen is in text mode. As soon as the plymouth
- screen comes in, the screen starts flickering massively. Nothing
- appeared on the screen except horizontal lines. I have an encrypted
- partition, so I type in the password and then the screen goes to
- flickering lines in color when Wayland starts.
- 
- I tried different kernels:
- - 5.17.8: failed
- - 5.15.x: all failed (from Ubuntu 22.04)
- - 5.13.19: works and back to normal
+ It seems the bug started with the 5.15.x series. I have been able, using
+ "mainline" to update up to 5.14.21. After this version the problem appears. 
Before it's fine.
  
  I found the following errors in the logs:
  * i915 :00:02.0: [drm] *ERROR* Atomic update failure on pipe A 
(start=43426 end=43427) time 300 us, min 2146, max 2159, scanline start 2131, 
end 2171
  * i915 :00:02.0: [drm] Finished loading DMC firmware 
i915/kbl_dmc_ver1_04.bin (v1.4)
  * i915 :00:02.0: [drm] [ENCODER:102:DDI B/PHY B] is disabled/in DSI mode 
with an ungated DDI clock, gate it
  * i915 :00:02.0: [drm] [ENCODER:113:DDI C/PHY C] is disabled/in DSI mode 
with an ungated DDI clock, gate it
  * i915 :00:02.0: [drm] *ERROR* CPU pipe A FIFO underrun
  
  So the problem is > 5.13.x series
  
- I temporarily solved it by downgrading to 5.13.19 from ubuntu mainline
- on a newly updated ubuntu 22.04! But it seems the bug affects all the
- kernels.
- 
  It might be related to
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1958191
- 
- Info:
- Description:  Ubuntu 22.04 LTS
- Release:  22.04
- 
- linux-image-5.15.0-30-generic:
-   Installed: 5.15.0-30.31
-   Candidate: 5.15.0-30.31
-   Version table:
-  *** 5.15.0-30.31 500
- 500 http://au.archive.ubuntu.com/ubuntu jammy-updates/main amd64 
Packages
- 100 /var/lib/dpkg/status

** Changed in: linux (Ubuntu)
   Status: Fix Released => New

** Summary changed:

- flickering and black screen from boot time, no more display after 22.04 
upgrade
+ flickering and black screen after grub after 22.04 upgrade

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1973676

Title:
  flickering and black screen after grub after 22.04 upgrade

Status in linux package in Ubuntu:
  New

Bug description:
  On an HP x360 Spectre (i7-8565U WhiskeyLake-U GT2 [UHD Graphics 620]), after 
upgrading from 21.10 to 22.04, at boot time just after grub, the kernel 
displays some errors messages then goes to black.
  I configure my machine with an encrypted filesystem and before it was going 
to the splash screen and asking for the partition password.
  If I type in the password, it seems to boot but the screen stays black 
forever.

  It seems the bug started with the 5.15.x series. I have been able, using
  "mainline" to update up to 5.14.21. After this version the problem appears. 
Before it's fine.

  I found the following errors in the logs:
  * i915 :00:02.0: [drm] *ERROR* Atomic update failure on pipe A 
(start=43426 end=43427) time 300 us, min 2146, max 2159, scanline start 2131, 
end 2171
  * i915 :00:02.0: [drm] Finished loading DMC firmware 
i915/kbl_dmc_ver1_04.bin (v1.4)
  * i915 :00:02.0: [drm] [ENCODER:102:DDI B/PHY B] is disabled/in DSI mode 
with an ungated DDI clock, gate it
  * i915 :00:02.0: [drm] [ENCODER:113:DDI C/PHY C] is disabled/in DSI mode 
with an ungated DDI clock, gate it
  * i915 :00:02.0: [drm] *ERROR* CPU pipe A FIFO underrun

  So the problem is > 5.13.x series

  It might be related to
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1958191

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1973676/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1990945] Re: i915: Add GuC v70.1.1 for all platforms

2022-10-04 Thread Anthony Wong
** Changed in: hwe-next
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1990945

Title:
  i915: Add GuC v70.1.1 for all platforms

Status in HWE Next:
  Fix Released
Status in linux-firmware package in Ubuntu:
  Fix Released
Status in linux-firmware source package in Jammy:
  Fix Committed
Status in linux-firmware source package in Kinetic:
  Fix Released

Bug description:
  [SRU Justification]

  [Impact]  
 

 
  Intel Quake N i915 for kernel 5.19+ will need v70.1.1 firmware files. 
 

 
  [Fix] 
 

 
  Upstream commit ab0d8c137d42 ("i915: Add GuC v70.1.1 for all platforms"). 
 

 
  [Test Case]   
 

 
  With v69 firmware, kernel prints: 
 

 
kernel: i915 :00:02.0: [drm] GuC firmware i915/adlp_guc_70.1.1.bin  
 
is recommended, but only i915/adlp_guc_69.0.3.bin was found

 
  New firmware would silence this line. 
 

 
  [Where problems could occur]  
 

 
  Firmware update, little knowledge to what was actually fixed, and the 
 
  actual revision being used is guarded by kernel.   

 
  [Other Info]  
 

 
  This update already exists in Kinetic, so only Jammy is nominated.

  == original bug report ==

  Quake N i915 for kernel 5.19+ will need the firmware files listed in the 
following mail post:
  https://www.spinics.net/lists/intel-gfx/msg295995.html

  We are targeting Quake N to release with 6.0-oem kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1990945/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1973676] Missing required logs.

2022-10-04 Thread Ubuntu Kernel Bot
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1973676

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1973676

Title:
  flickering and black screen after grub after 22.04 upgrade

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  On an HP x360 Spectre (i7-8565U WhiskeyLake-U GT2 [UHD Graphics 620]), after 
upgrading from 21.10 to 22.04, at boot time just after grub, the kernel 
displays some errors messages then goes to black.
  I configure my machine with an encrypted filesystem and before it was going 
to the splash screen and asking for the partition password.
  If I type in the password, it seems to boot but the screen stays black 
forever.

  It seems the bug started with the 5.15.x series. I have been able, using
  "mainline" to update up to 5.14.21. After this version the problem appears. 
Before it's fine.

  I found the following errors in the logs:
  * i915 :00:02.0: [drm] *ERROR* Atomic update failure on pipe A 
(start=43426 end=43427) time 300 us, min 2146, max 2159, scanline start 2131, 
end 2171
  * i915 :00:02.0: [drm] Finished loading DMC firmware 
i915/kbl_dmc_ver1_04.bin (v1.4)
  * i915 :00:02.0: [drm] [ENCODER:102:DDI B/PHY B] is disabled/in DSI mode 
with an ungated DDI clock, gate it
  * i915 :00:02.0: [drm] [ENCODER:113:DDI C/PHY C] is disabled/in DSI mode 
with an ungated DDI clock, gate it
  * i915 :00:02.0: [drm] *ERROR* CPU pipe A FIFO underrun

  So the problem is > 5.13.x series

  It might be related to
  https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1958191

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1973676/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


  1   2   >