[Bug 1953689] Re: smartpqi: Update 20.04.4 to latest kernel.org patch level
This bug was fixed in the package linux - 5.15.0-22.22 --- linux (5.15.0-22.22) jammy; urgency=medium * jammy/linux: 5.15.0-22.22 -proposed tracker (LP: #1960290) -- Paolo Pisati Tue, 08 Feb 2022 10:48:49 +0100 ** Changed in: linux (Ubuntu) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953689 Title: smartpqi: Update 20.04.4 to latest kernel.org patch level To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1953689/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953689] Re: smartpqi: Update 20.04.4 to latest kernel.org patch level
This bug was fixed in the package linux - 5.13.0-30.33 --- linux (5.13.0-30.33) impish; urgency=medium * impish/linux: 5.13.0-30.33 -proposed tracker (LP: #1960055) * systemd/248.3-1ubuntu8.2 ADT test failure with linux/5.13.0-29.32 (LP: #1960034) - Revert "block: avoid to quiesce queue in elevator_init_mq" - Revert "blk-mq: cancel blk-mq dispatch work in both blk_cleanup_queue and disk_release()" linux (5.13.0-29.32) impish; urgency=medium * impish/linux: 5.13.0-29.32 -proposed tracker (LP: #1959238) * Packaging resync (LP: #1786013) - debian/dkms-versions -- update from kernel-versions (main/2022.01.31) * CVE-2022-22942 - SAUCE: drm/vmwgfx: Fix stale file descriptors on failed usercopy * CVE-2022-0330 - drm/i915: Flush TLBs before releasing backing store * Impish update: upstream stable patchset 2022-01-05 (LP: #1956508) - ACPI: Get acpi_device's parent from the parent field - USB: serial: option: add Telit LE910S1 0x9200 composition - USB: serial: option: add Fibocom FM101-GL variants - usb: dwc2: gadget: Fix ISOC flow for elapsed frames - usb: dwc2: hcd_queue: Fix use of floating point literal - usb: dwc3: gadget: Ignore NoStream after End Transfer - usb: dwc3: gadget: Check for L1/L2/U3 for Start Transfer - usb: dwc3: gadget: Fix null pointer exception - net: nexthop: fix null pointer dereference when IPv6 is not enabled - usb: chipidea: ci_hdrc_imx: fix potential error pointer dereference in probe - usb: typec: fusb302: Fix masking of comparator and bc_lvl interrupts - usb: hub: Fix usb enumeration issue due to address0 race - usb: hub: Fix locking issues with address0_mutex - binder: fix test regression due to sender_euid change - ALSA: ctxfi: Fix out-of-range access - ALSA: hda/realtek: Add quirk for ASRock NUC Box 1100 - ALSA: hda/realtek: Fix LED on HP ProBook 435 G7 - media: cec: copy sequence field for the reply - Revert "parisc: Fix backtrace to always include init funtion names" - HID: wacom: Use "Confidence" flag to prevent reporting invalid contacts - staging/fbtft: Fix backlight - staging: greybus: Add missing rwsem around snd_ctl_remove() calls - staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() - fuse: release pipe buf after last use - xen: don't continue xenstore initialization in case of errors - xen: detect uninitialized xenbus in xenbus_init - KVM: PPC: Book3S HV: Prevent POWER7/8 TLB flush flushing SLB - tracing/uprobe: Fix uprobe_perf_open probes iteration - tracing: Fix pid filtering when triggers are attached - mmc: sdhci-esdhc-imx: disable CMDQ support - mmc: sdhci: Fix ADMA for PAGE_SIZE >= 64KiB - mdio: aspeed: Fix "Link is Down" issue - powerpc/32: Fix hardlockup on vmap stack overflow - PCI: aardvark: Deduplicate code in advk_pcie_rd_conf() - PCI: aardvark: Implement re-issuing config requests on CRS response - PCI: aardvark: Simplify initialization of rootcap on virtual bridge - PCI: aardvark: Fix link training - proc/vmcore: fix clearing user buffer by properly using clear_user() - netfilter: ctnetlink: fix filtering with CTA_TUPLE_REPLY - netfilter: ctnetlink: do not erase error code with EINVAL - netfilter: ipvs: Fix reuse connection if RS weight is 0 - netfilter: flowtable: fix IPv6 tunnel addr match - ARM: dts: BCM5301X: Fix I2C controller interrupt - ARM: dts: BCM5301X: Add interrupt properties to GPIO node - ARM: dts: bcm2711: Fix PCIe interrupts - ASoC: qdsp6: q6routing: Conditionally reset FrontEnd Mixer - ASoC: qdsp6: q6asm: fix q6asm_dai_prepare error handling - ASoC: topology: Add missing rwsem around snd_ctl_remove() calls - ASoC: codecs: wcd934x: return error code correctly from hw_params - net: ieee802154: handle iftypes as u32 - firmware: arm_scmi: pm: Propagate return value to caller - NFSv42: Don't fail clone() unless the OP_CLONE operation failed - ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE - drm/nouveau/acr: fix a couple NULL vs IS_ERR() checks - scsi: mpt3sas: Fix kernel panic during drive powercycle test - drm/vc4: fix error code in vc4_create_object() - net: marvell: prestera: fix double free issue on err path - iavf: Prevent changing static ITR values if adaptive moderation is on - ALSA: intel-dsp-config: add quirk for JSL devices based on ES8336 codec - mptcp: fix delack timer - firmware: smccc: Fix check for ARCH_SOC_ID not implemented - ipv6: fix typos in __ip6_finish_output() - nfp: checking parameter process for rx-usecs/tx-usecs is invalid - net: stmmac: retain PTP clock time during SIOCSHWTSTAMP ioctls - net: ipv6: add fib6_nh_release_dsts stub - net: nexthop: release IPv6 per-cpu dsts when replacing a nexthop group - ice: fix vsi->txq_map sizing - ice: avoid bpf_prog refcount underflow
[Bug 1953689] Re: smartpqi: Update 20.04.4 to latest kernel.org patch level
Confirmed the driver to be updated on impish/linux and focal/linux- hwe-5.13: * Impish $ uname -a Linux autopkgtest 5.13.0-30-generic #33-Ubuntu SMP Fri Feb 4 17:03:31 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux $ modinfo smartpqi | grep "^version:" version:2.1.12-055 * Focal $ uname -a Linux autopkgtest-focal 5.13.0-30-generic #33~20.04.1-Ubuntu SMP Mon Feb 7 14:25:10 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux $ modinfo smartpqi | grep "^version:" version:2.1.12-055 ** Tags removed: verification-needed-focal verification-needed-impish ** Tags added: verification-done-focal verification-done-impish -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953689 Title: smartpqi: Update 20.04.4 to latest kernel.org patch level To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1953689/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953689] Re: smartpqi: Update 20.04.4 to latest kernel.org patch level
This bug is awaiting verification that the linux- gcp-5.13/5.13.0-1015.18~20.04.1 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-focal' to 'verification-done-focal'. If the problem still exists, change the tag 'verification-needed-focal' to 'verification-failed-focal'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: verification-needed-focal -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953689 Title: smartpqi: Update 20.04.4 to latest kernel.org patch level To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1953689/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953689] Re: smartpqi: Update 20.04.4 to latest kernel.org patch level
This bug is awaiting verification that the linux/5.13.0-29.32 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-impish' to 'verification-done-impish'. If the problem still exists, change the tag 'verification-needed-impish' to 'verification-failed-impish'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: verification-needed-impish -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953689 Title: smartpqi: Update 20.04.4 to latest kernel.org patch level To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1953689/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953689] Re: smartpqi: Update 20.04.4 to latest kernel.org patch level
** Changed in: linux (Ubuntu Impish) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953689 Title: smartpqi: Update 20.04.4 to latest kernel.org patch level To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1953689/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953689] Re: smartpqi: Update 20.04.4 to latest kernel.org patch level
** Also affects: linux (Ubuntu Impish) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Impish) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Impish) Status: New => In Progress ** Changed in: linux (Ubuntu Impish) Assignee: (unassigned) => Jeff Lane (bladernr) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953689 Title: smartpqi: Update 20.04.4 to latest kernel.org patch level To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1953689/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 1953689] Re: smartpqi: Update 20.04.4 to latest kernel.org patch level
Just an update, I've had to pull these into both Jammy and Impish (Jammy to avoid regressions since these were pulled from 5.16, so they should land in both 5.13 and 5.15 (22.04). They just got acked this morning. On Thu, Dec 16, 2021 at 5:10 PM Don Brace <1953...@bugs.launchpad.net> wrote: > > I updated the SRU Justification > > ** Description changed: > > SRU Justification: > > Impact: > - > + Update the smartpqi driver with latest kernel.org patches from git repo: > + git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git > + > + These patches will align the Canonical smartpqi driver with kernel.org > + > > Fix: > This is targeted at 5.13 for 20.04.4 HWE > > Here is a list of patches that need applied to 20.04.4 to bring the > smartpqi up to date with kernel.org. > > - 64fc9015fbeb scsi: smartpqi: Switch to attribute groups > - 0ca190805784 scsi: smartpqi: Call scsi_done() directly > + > 605ae389ea02 scsi: smartpqi: Update version to 2.1.12-055 > 80982656b78e scsi: smartpqi: Add 3252-8i PCI id > d4dc6aea93cb scsi: smartpqi: Fix duplicate device nodes for tape changers > 987d35605b7e scsi: smartpqi: Fix boot failure during LUN rebuild > 28ca6d876c5a scsi: smartpqi: Add extended report physical LUNs > 4f3cefc3084d scsi: smartpqi: Avoid failing I/Os for offline devices > be76f90668d8 scsi: smartpqi: Add TEST UNIT READY check for SANITIZE > operation > 6ce1ddf53252 scsi: smartpqi: Update LUN reset handler > 5d1f03e6f49a scsi: smartpqi: Capture controller reason codes > 9ee5d6e9ac52 scsi: smartpqi: Add controller handshake during kdump > 819225b03dc7 scsi: smartpqi: Update device removal management > 5f492a7aa13b scsi: smartpqi: Replace one-element array with flexible-array > member > > These patches should all be upstream as of 5.16. > > Testcase: > - > + kdump tests. > + fio performance testing to demonstrate no performance regressions. > > -- > You received this bug notification because you are subscribed to the bug > report. > https://bugs.launchpad.net/bugs/1953689 > > Title: > smartpqi: Update 20.04.4 to latest kernel.org patch level > > Status in linux package in Ubuntu: > Incomplete > > Bug description: > SRU Justification: > > Impact: > Update the smartpqi driver with latest kernel.org patches from git repo: > git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git > > These patches will align the Canonical smartpqi driver with kernel.org > > > Fix: > This is targeted at 5.13 for 20.04.4 HWE > > Here is a list of patches that need applied to 20.04.4 to bring the > smartpqi up to date with kernel.org. > > > 605ae389ea02 scsi: smartpqi: Update version to 2.1.12-055 > 80982656b78e scsi: smartpqi: Add 3252-8i PCI id > d4dc6aea93cb scsi: smartpqi: Fix duplicate device nodes for tape changers > 987d35605b7e scsi: smartpqi: Fix boot failure during LUN rebuild > 28ca6d876c5a scsi: smartpqi: Add extended report physical LUNs > 4f3cefc3084d scsi: smartpqi: Avoid failing I/Os for offline devices > be76f90668d8 scsi: smartpqi: Add TEST UNIT READY check for SANITIZE > operation > 6ce1ddf53252 scsi: smartpqi: Update LUN reset handler > 5d1f03e6f49a scsi: smartpqi: Capture controller reason codes > 9ee5d6e9ac52 scsi: smartpqi: Add controller handshake during kdump > 819225b03dc7 scsi: smartpqi: Update device removal management > 5f492a7aa13b scsi: smartpqi: Replace one-element array with flexible-array > member > > These patches should all be upstream as of 5.16. > > Testcase: > kdump tests. > fio performance testing to demonstrate no performance regressions. > > To manage notifications about this bug go to: > https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1953689/+subscriptions > > Launchpad-Notification-Type: bug > Launchpad-Bug: distribution=ubuntu; sourcepackage=linux; component=main; > status=Incomplete; importance=Undecided; assignee=jeffrey.l...@canonical.com; > Launchpad-Bug-Tags: smartpqi > Launchpad-Bug-Information-Type: Public > Launchpad-Bug-Private: no > Launchpad-Bug-Security-Vulnerability: no > Launchpad-Bug-Commenters: bladernr bracedon ubuntu-kernel-bot > Launchpad-Bug-Reporter: Don Brace (bracedon) > Launchpad-Bug-Modifier: Don Brace (bracedon) > Launchpad-Message-Rationale: Subscriber > Launchpad-Message-For: bladernr > -- Jeff Lane Engineering Manager IHV/OEM Alliances and Server Certification "Entropy isn't what it used to be." -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953689 Title: smartpqi: Update 20.04.4 to latest kernel.org patch level To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1953689/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953689] Re: smartpqi: Update 20.04.4 to latest kernel.org patch level
** Changed in: linux (Ubuntu) Status: Incomplete => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953689 Title: smartpqi: Update 20.04.4 to latest kernel.org patch level To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1953689/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953689] Re: smartpqi: Update 20.04.4 to latest kernel.org patch level
I updated the SRU Justification ** Description changed: SRU Justification: Impact: - + Update the smartpqi driver with latest kernel.org patches from git repo: + git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git + + These patches will align the Canonical smartpqi driver with kernel.org + Fix: This is targeted at 5.13 for 20.04.4 HWE Here is a list of patches that need applied to 20.04.4 to bring the smartpqi up to date with kernel.org. - 64fc9015fbeb scsi: smartpqi: Switch to attribute groups - 0ca190805784 scsi: smartpqi: Call scsi_done() directly + 605ae389ea02 scsi: smartpqi: Update version to 2.1.12-055 80982656b78e scsi: smartpqi: Add 3252-8i PCI id d4dc6aea93cb scsi: smartpqi: Fix duplicate device nodes for tape changers 987d35605b7e scsi: smartpqi: Fix boot failure during LUN rebuild 28ca6d876c5a scsi: smartpqi: Add extended report physical LUNs 4f3cefc3084d scsi: smartpqi: Avoid failing I/Os for offline devices be76f90668d8 scsi: smartpqi: Add TEST UNIT READY check for SANITIZE operation 6ce1ddf53252 scsi: smartpqi: Update LUN reset handler 5d1f03e6f49a scsi: smartpqi: Capture controller reason codes 9ee5d6e9ac52 scsi: smartpqi: Add controller handshake during kdump 819225b03dc7 scsi: smartpqi: Update device removal management 5f492a7aa13b scsi: smartpqi: Replace one-element array with flexible-array member These patches should all be upstream as of 5.16. Testcase: - + kdump tests. + fio performance testing to demonstrate no performance regressions. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953689 Title: smartpqi: Update 20.04.4 to latest kernel.org patch level To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1953689/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953689] Re: smartpqi: Update 20.04.4 to latest kernel.org patch level
** Description changed: + SRU Justification: + + Impact: + + + Fix: + Here is a list of patches that need applied to 20.04.4 to bring the smartpqi up to date with kernel.org. 64fc9015fbeb scsi: smartpqi: Switch to attribute groups 0ca190805784 scsi: smartpqi: Call scsi_done() directly 605ae389ea02 scsi: smartpqi: Update version to 2.1.12-055 80982656b78e scsi: smartpqi: Add 3252-8i PCI id d4dc6aea93cb scsi: smartpqi: Fix duplicate device nodes for tape changers 987d35605b7e scsi: smartpqi: Fix boot failure during LUN rebuild 28ca6d876c5a scsi: smartpqi: Add extended report physical LUNs 4f3cefc3084d scsi: smartpqi: Avoid failing I/Os for offline devices be76f90668d8 scsi: smartpqi: Add TEST UNIT READY check for SANITIZE operation 6ce1ddf53252 scsi: smartpqi: Update LUN reset handler 5d1f03e6f49a scsi: smartpqi: Capture controller reason codes 9ee5d6e9ac52 scsi: smartpqi: Add controller handshake during kdump 819225b03dc7 scsi: smartpqi: Update device removal management 5f492a7aa13b scsi: smartpqi: Replace one-element array with flexible-array member - [Impact] + These patches should all be upstream as of 5.16. - * An explanation of the effects of the bug on users and - - * justification for backporting the fix to the stable release. - - * In addition, it is helpful, but not required, to include an -explanation of how the upload fixes this bug. - - [Test Plan] - - * detailed instructions how to reproduce the bug - - * these should allow someone who is not familiar with the affected -package to reproduce the bug and verify that the updated package fixes -the problem. - - * if other testing is appropriate to perform before landing this update, -this should also be described here. - - [Where problems could occur] - - * Think about what the upload changes in the software. Imagine the change is -wrong or breaks something else: how would this show up? - - * It is assumed that any SRU candidate patch is well-tested before -upload and has a low overall risk of regression, but it's important -to make the effort to think about what ''could'' happen in the -event of a regression. - - * This must '''never''' be "None" or "Low", or entirely an argument as to why -your upload is low risk. - - * This both shows the SRU team that the risks have been considered, -and provides guidance to testers in regression-testing the SRU. - - [Other Info] - - * Anything else you think is useful to include - * Anticipate questions from users, SRU, +1 maintenance, security teams and the Technical Board - * and address these questions in advance + Testcase: + ** Description changed: SRU Justification: - Impact: + Impact: Fix: + This is targeted at 5.13 for 20.04.4 HWE Here is a list of patches that need applied to 20.04.4 to bring the smartpqi up to date with kernel.org. 64fc9015fbeb scsi: smartpqi: Switch to attribute groups 0ca190805784 scsi: smartpqi: Call scsi_done() directly 605ae389ea02 scsi: smartpqi: Update version to 2.1.12-055 80982656b78e scsi: smartpqi: Add 3252-8i PCI id d4dc6aea93cb scsi: smartpqi: Fix duplicate device nodes for tape changers 987d35605b7e scsi: smartpqi: Fix boot failure during LUN rebuild 28ca6d876c5a scsi: smartpqi: Add extended report physical LUNs 4f3cefc3084d scsi: smartpqi: Avoid failing I/Os for offline devices be76f90668d8 scsi: smartpqi: Add TEST UNIT READY check for SANITIZE operation 6ce1ddf53252 scsi: smartpqi: Update LUN reset handler 5d1f03e6f49a scsi: smartpqi: Capture controller reason codes 9ee5d6e9ac52 scsi: smartpqi: Add controller handshake during kdump 819225b03dc7 scsi: smartpqi: Update device removal management 5f492a7aa13b scsi: smartpqi: Replace one-element array with flexible-array member These patches should all be upstream as of 5.16. - Testcase: + Testcase: -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953689 Title: smartpqi: Update 20.04.4 to latest kernel.org patch level To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1953689/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953689] Re: smartpqi: Update 20.04.4 to latest kernel.org patch level
Added the SRU template to the bug summary ** Changed in: linux (Ubuntu) Assignee: (unassigned) => Jeff Lane (bladernr) ** Description changed: Here is a list of patches that need applied to 20.04.4 to bring the smartpqi up to date with kernel.org. 64fc9015fbeb scsi: smartpqi: Switch to attribute groups 0ca190805784 scsi: smartpqi: Call scsi_done() directly 605ae389ea02 scsi: smartpqi: Update version to 2.1.12-055 80982656b78e scsi: smartpqi: Add 3252-8i PCI id d4dc6aea93cb scsi: smartpqi: Fix duplicate device nodes for tape changers 987d35605b7e scsi: smartpqi: Fix boot failure during LUN rebuild 28ca6d876c5a scsi: smartpqi: Add extended report physical LUNs 4f3cefc3084d scsi: smartpqi: Avoid failing I/Os for offline devices be76f90668d8 scsi: smartpqi: Add TEST UNIT READY check for SANITIZE operation 6ce1ddf53252 scsi: smartpqi: Update LUN reset handler 5d1f03e6f49a scsi: smartpqi: Capture controller reason codes 9ee5d6e9ac52 scsi: smartpqi: Add controller handshake during kdump 819225b03dc7 scsi: smartpqi: Update device removal management 5f492a7aa13b scsi: smartpqi: Replace one-element array with flexible-array member + + [Impact] + + * An explanation of the effects of the bug on users and + + * justification for backporting the fix to the stable release. + + * In addition, it is helpful, but not required, to include an +explanation of how the upload fixes this bug. + + [Test Plan] + + * detailed instructions how to reproduce the bug + + * these should allow someone who is not familiar with the affected +package to reproduce the bug and verify that the updated package fixes +the problem. + + * if other testing is appropriate to perform before landing this update, +this should also be described here. + + [Where problems could occur] + + * Think about what the upload changes in the software. Imagine the change is +wrong or breaks something else: how would this show up? + + * It is assumed that any SRU candidate patch is well-tested before +upload and has a low overall risk of regression, but it's important +to make the effort to think about what ''could'' happen in the +event of a regression. + + * This must '''never''' be "None" or "Low", or entirely an argument as to why +your upload is low risk. + + * This both shows the SRU team that the risks have been considered, +and provides guidance to testers in regression-testing the SRU. + + [Other Info] + + * Anything else you think is useful to include + * Anticipate questions from users, SRU, +1 maintenance, security teams and the Technical Board + * and address these questions in advance -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953689 Title: smartpqi: Update 20.04.4 to latest kernel.org patch level To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1953689/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1953689] Re: smartpqi: Update 20.04.4 to latest kernel.org patch level
Added Jeff Lane, Scott Benesh, Gerry Morong. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1953689 Title: smartpqi: Update 20.04.4 to latest kernel.org patch level To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1953689/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs