[Bug 2067106] Re: Blacklist coresight_etm4x

2024-06-18 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-
nvidia-6.8/6.8.0-1008.8~22.04.1 kernel in -proposed solves the problem.
Please test the kernel and update this bug with the results. If the
problem is solved, change the tag 'verification-needed-jammy-linux-
nvidia-6.8' to 'verification-done-jammy-linux-nvidia-6.8'. If the
problem still exists, change the tag 'verification-needed-jammy-linux-
nvidia-6.8' to 'verification-failed-jammy-linux-nvidia-6.8'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-jammy-linux-nvidia-6.8-v2 
verification-needed-jammy-linux-nvidia-6.8

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067106

Title:
  Blacklist coresight_etm4x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-nvidia/+bug/2067106/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067106] Re: Blacklist coresight_etm4x

2024-06-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-nvidia - 6.8.0-1007.7

---
linux-nvidia (6.8.0-1007.7) noble; urgency=medium

  * noble/linux-nvidia: 6.8.0-1007.7 -proposed tracker (LP: #2064335)

  * Packaging resync (LP: #1786013)
- [Packaging] update Ubuntu.md
- [Packaging] debian.nvidia/dkms-versions -- update from kernel-versions
  (main/2024.04.29)

  * Add Real-time Linux Analysis tool (rtla) to linux-tools (LP: #2059080)
- [Packaging] add Real-time Linux Analysis tool (rtla) to linux-tools
- [Packaging] update dependencies for rtla

  * Provide python perf module (LP: #2051560)
- [Packaging] enable perf python module

  * Address out-of-bounds issue when using TPM SPI interface (LP: #2067429)
- tpm_tis_spi: Account for SPI header when allocating TPM SPI xfer buffer

  * linux-nvidia-6.5_6.5.0-1014.14 breaks with earlier BIOS release, and
modeset/resolutions are wrong (LP: #2061930) // Blacklist coresight_etm4x
(LP: #2067106)
- [Packaging] blacklist coresight_etm4x

  * Update the pre-built nvidia-fs driver to the 2.20.5 version (LP: #2066955)
- NVIDIA: [Packaging] update nvidia-fs driver to latest version

  * backport arm64 THP improvements from 6.9 (LP: #2059316)
- arm64/mm: make set_ptes() robust when OAs cross 48-bit boundary
- arm/pgtable: define PFN_PTE_SHIFT
- nios2/pgtable: define PFN_PTE_SHIFT
- powerpc/pgtable: define PFN_PTE_SHIFT
- riscv/pgtable: define PFN_PTE_SHIFT
- s390/pgtable: define PFN_PTE_SHIFT
- sparc/pgtable: define PFN_PTE_SHIFT
- mm/pgtable: make pte_next_pfn() independent of set_ptes()
- arm/mm: use pte_next_pfn() in set_ptes()
- powerpc/mm: use pte_next_pfn() in set_ptes()
- mm/memory: factor out copying the actual PTE in copy_present_pte()
- mm/memory: pass PTE to copy_present_pte()
- mm/memory: optimize fork() with PTE-mapped THP
- mm/memory: ignore dirty/accessed/soft-dirty bits in folio_pte_batch()
- mm/memory: ignore writable bit in folio_pte_batch()
- mm: clarify the spec for set_ptes()
- mm: thp: batch-collapse PMD with set_ptes()
- mm: introduce pte_advance_pfn() and use for pte_next_pfn()
- arm64/mm: convert pte_next_pfn() to pte_advance_pfn()
- x86/mm: convert pte_next_pfn() to pte_advance_pfn()
- mm: tidy up pte_next_pfn() definition
- arm64/mm: convert READ_ONCE(*ptep) to ptep_get(ptep)
- arm64/mm: convert set_pte_at() to set_ptes(..., 1)
- arm64/mm: convert ptep_clear() to ptep_get_and_clear()
- arm64/mm: new ptep layer to manage contig bit
- arm64/mm: dplit __flush_tlb_range() to elide trailing DSB
- NVIDIA: [Config] arm64: ARM64_CONTPTE=y
- arm64/mm: wire up PTE_CONT for user mappings
- arm64/mm: implement new wrprotect_ptes() batch API
- arm64/mm: implement new [get_and_]clear_full_ptes() batch APIs
- mm: add pte_batch_hint() to reduce scanning in folio_pte_batch()
- arm64/mm: implement pte_batch_hint()
- arm64/mm: __always_inline to improve fork() perf
- arm64/mm: automatically fold contpte mappings
- arm64/mm: export contpte symbols only to GPL users
- arm64/mm: improve comment in contpte_ptep_get_lockless()

  * pull-request: Fixes: b2b56a163230 ("gpio: tegra186: Check GPIO pin
permission before access.") (LP: #2064549)
- gpio: tegra186: Fix tegra186_gpio_is_accessible() check

  [ Ubuntu: 6.8.0-35.35 ]

  * noble/linux: 6.8.0-35.35 -proposed tracker (LP: #2065886)
  * CVE-2024-21823
- VFIO: Add the SPR_DSA and SPR_IAX devices to the denylist
- dmaengine: idxd: add a new security check to deal with a hardware erratum
- dmaengine: idxd: add a write() method for applications to submit work

  [ Ubuntu: 6.8.0-34.34 ]

  * noble/linux: 6.8.0-34.34 -proposed tracker (LP: #2065167)
  * Packaging resync (LP: #1786013)
- [Packaging] debian.master/dkms-versions -- update from kernel-versions
  (main/2024.04.29)

  [ Ubuntu: 6.8.0-32.32 ]

  * noble/linux: 6.8.0-32.32 -proposed tracker (LP: #2064344)
  * Packaging resync (LP: #1786013)
- [Packaging] drop getabis data
- [Packaging] update variants
- [Packaging] update annotations scripts
- [Packaging] debian.master/dkms-versions -- update from kernel-versions
  (main/2024.04.29)
  * Enable Nezha board (LP: #1975592)
- [Config] Enable CONFIG_REGULATOR_FIXED_VOLTAGE on riscv64
  * Enable Nezha board (LP: #1975592) // Enable StarFive VisionFive 2 board
(LP: #2013232)
- [Config] Enable CONFIG_SERIAL_8250_DW on riscv64
  * RISC-V kernel config is out of sync with other archs (LP: #1981437)
- [Config] Sync riscv64 config with other architectures
  * obsolete out-of-tree ivsc dkms in favor of in-tree one (LP: #2061747)
- ACPI: scan: Defer enumeration of devices with a _DEP pointing to IVSC 
device
- Revert "mei: vsc: Call wake_up() in the threaded IRQ handler"
- mei: vsc: Unregister interrupt handler for system suspend
- media: ipu-bridge: Add ov01a10 in

[Bug 2067106] Re: Blacklist coresight_etm4x

2024-06-03 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-nvidia/6.8.0-1007.7
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-noble-linux-nvidia' to 'verification-done-
noble-linux-nvidia'. If the problem still exists, change the tag
'verification-needed-noble-linux-nvidia' to 'verification-failed-noble-
linux-nvidia'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-noble-linux-nvidia-v2 
verification-needed-noble-linux-nvidia

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067106

Title:
  Blacklist coresight_etm4x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-nvidia/+bug/2067106/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs