[Bug 2067106] Re: Blacklist coresight_etm4x
This bug is awaiting verification that the linux- nvidia-6.8/6.8.0-1008.8~22.04.1 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-jammy-linux- nvidia-6.8' to 'verification-done-jammy-linux-nvidia-6.8'. If the problem still exists, change the tag 'verification-needed-jammy-linux- nvidia-6.8' to 'verification-failed-jammy-linux-nvidia-6.8'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: kernel-spammed-jammy-linux-nvidia-6.8-v2 verification-needed-jammy-linux-nvidia-6.8 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067106 Title: Blacklist coresight_etm4x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-nvidia/+bug/2067106/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2067106] Re: Blacklist coresight_etm4x
This bug was fixed in the package linux-nvidia - 6.8.0-1007.7 --- linux-nvidia (6.8.0-1007.7) noble; urgency=medium * noble/linux-nvidia: 6.8.0-1007.7 -proposed tracker (LP: #2064335) * Packaging resync (LP: #1786013) - [Packaging] update Ubuntu.md - [Packaging] debian.nvidia/dkms-versions -- update from kernel-versions (main/2024.04.29) * Add Real-time Linux Analysis tool (rtla) to linux-tools (LP: #2059080) - [Packaging] add Real-time Linux Analysis tool (rtla) to linux-tools - [Packaging] update dependencies for rtla * Provide python perf module (LP: #2051560) - [Packaging] enable perf python module * Address out-of-bounds issue when using TPM SPI interface (LP: #2067429) - tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer * linux-nvidia-6.5_6.5.0-1014.14 breaks with earlier BIOS release, and modeset/resolutions are wrong (LP: #2061930) // Blacklist coresight_etm4x (LP: #2067106) - [Packaging] blacklist coresight_etm4x * Update the pre-built nvidia-fs driver to the 2.20.5 version (LP: #2066955) - NVIDIA: [Packaging] update nvidia-fs driver to latest version * backport arm64 THP improvements from 6.9 (LP: #2059316) - arm64/mm: make set_ptes() robust when OAs cross 48-bit boundary - arm/pgtable: define PFN_PTE_SHIFT - nios2/pgtable: define PFN_PTE_SHIFT - powerpc/pgtable: define PFN_PTE_SHIFT - riscv/pgtable: define PFN_PTE_SHIFT - s390/pgtable: define PFN_PTE_SHIFT - sparc/pgtable: define PFN_PTE_SHIFT - mm/pgtable: make pte_next_pfn() independent of set_ptes() - arm/mm: use pte_next_pfn() in set_ptes() - powerpc/mm: use pte_next_pfn() in set_ptes() - mm/memory: factor out copying the actual PTE in copy_present_pte() - mm/memory: pass PTE to copy_present_pte() - mm/memory: optimize fork() with PTE-mapped THP - mm/memory: ignore dirty/accessed/soft-dirty bits in folio_pte_batch() - mm/memory: ignore writable bit in folio_pte_batch() - mm: clarify the spec for set_ptes() - mm: thp: batch-collapse PMD with set_ptes() - mm: introduce pte_advance_pfn() and use for pte_next_pfn() - arm64/mm: convert pte_next_pfn() to pte_advance_pfn() - x86/mm: convert pte_next_pfn() to pte_advance_pfn() - mm: tidy up pte_next_pfn() definition - arm64/mm: convert READ_ONCE(*ptep) to ptep_get(ptep) - arm64/mm: convert set_pte_at() to set_ptes(..., 1) - arm64/mm: convert ptep_clear() to ptep_get_and_clear() - arm64/mm: new ptep layer to manage contig bit - arm64/mm: dplit __flush_tlb_range() to elide trailing DSB - NVIDIA: [Config] arm64: ARM64_CONTPTE=y - arm64/mm: wire up PTE_CONT for user mappings - arm64/mm: implement new wrprotect_ptes() batch API - arm64/mm: implement new [get_and_]clear_full_ptes() batch APIs - mm: add pte_batch_hint() to reduce scanning in folio_pte_batch() - arm64/mm: implement pte_batch_hint() - arm64/mm: __always_inline to improve fork() perf - arm64/mm: automatically fold contpte mappings - arm64/mm: export contpte symbols only to GPL users - arm64/mm: improve comment in contpte_ptep_get_lockless() * pull-request: Fixes: b2b56a163230 ("gpio: tegra186: Check GPIO pin permission before access.") (LP: #2064549) - gpio: tegra186: Fix tegra186_gpio_is_accessible() check [ Ubuntu: 6.8.0-35.35 ] * noble/linux: 6.8.0-35.35 -proposed tracker (LP: #2065886) * CVE-2024-21823 - VFIO: Add the SPR_DSA and SPR_IAX devices to the denylist - dmaengine: idxd: add a new security check to deal with a hardware erratum - dmaengine: idxd: add a write() method for applications to submit work [ Ubuntu: 6.8.0-34.34 ] * noble/linux: 6.8.0-34.34 -proposed tracker (LP: #2065167) * Packaging resync (LP: #1786013) - [Packaging] debian.master/dkms-versions -- update from kernel-versions (main/2024.04.29) [ Ubuntu: 6.8.0-32.32 ] * noble/linux: 6.8.0-32.32 -proposed tracker (LP: #2064344) * Packaging resync (LP: #1786013) - [Packaging] drop getabis data - [Packaging] update variants - [Packaging] update annotations scripts - [Packaging] debian.master/dkms-versions -- update from kernel-versions (main/2024.04.29) * Enable Nezha board (LP: #1975592) - [Config] Enable CONFIG_REGULATOR_FIXED_VOLTAGE on riscv64 * Enable Nezha board (LP: #1975592) // Enable StarFive VisionFive 2 board (LP: #2013232) - [Config] Enable CONFIG_SERIAL_8250_DW on riscv64 * RISC-V kernel config is out of sync with other archs (LP: #1981437) - [Config] Sync riscv64 config with other architectures * obsolete out-of-tree ivsc dkms in favor of in-tree one (LP: #2061747) - ACPI: scan: Defer enumeration of devices with a _DEP pointing to IVSC device - Revert "mei: vsc: Call wake_up() in the threaded IRQ handler" - mei: vsc: Unregister interrupt handler for system suspend - media: ipu-bridge: Add ov01a10 in
[Bug 2067106] Re: Blacklist coresight_etm4x
This bug is awaiting verification that the linux-nvidia/6.8.0-1007.7 kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-noble-linux-nvidia' to 'verification-done- noble-linux-nvidia'. If the problem still exists, change the tag 'verification-needed-noble-linux-nvidia' to 'verification-failed-noble- linux-nvidia'. If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you! ** Tags added: kernel-spammed-noble-linux-nvidia-v2 verification-needed-noble-linux-nvidia -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067106 Title: Blacklist coresight_etm4x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-nvidia/+bug/2067106/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs