[Kernel-packages] [Bug 1832661] Re: Xenial update: 4.4.181 upstream stable release

2019-10-03 Thread Po-Hsu Lin
** Changed in: linux (Ubuntu) Status: Confirmed => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1832661 Title: Xenial update: 4.4.181 upstream stable release Status in

[Kernel-packages] [Bug 1832661] Re: Xenial update: 4.4.181 upstream stable release

2019-07-24 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-157.185 --- linux (4.4.0-157.185) xenial; urgency=medium * linux: 4.4.0-157.185 -proposed tracker (LP: #1837476) * systemd 229-4ubuntu21.22 ADT test failure with linux 4.4.0-156.183 (storage) (LP: #1837235) - Revert

[Kernel-packages] [Bug 1832661] Re: Xenial update: 4.4.181 upstream stable release

2019-07-01 Thread Kleber Sacilotto de Souza
** Changed in: linux (Ubuntu Xenial) Status: Confirmed => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1832661 Title: Xenial update: 4.4.181 upstream stable

[Kernel-packages] [Bug 1832661] Re: Xenial update: 4.4.181 upstream stable release

2019-06-17 Thread Khaled El Mously
These 4 patches didn't apply cleanly and needed manual merging. Nothing too hairy though: synchronize sync(2) against cgroup writeback membership switches KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes arm64: cpu_ops: fix a leaked reference by adding missing of_node_put

[Kernel-packages] [Bug 1832661] Re: Xenial update: 4.4.181 upstream stable release

2019-06-17 Thread Khaled El Mously
The following patches were NOT applied since they were applied previously: tools include: Adopt linux/bits.h net: create skb_gso_validate_mac_len() bnx2x: disable GSO where gso_size is too big for hardware -- You received this bug notification because you are a member of Kernel Packages, which

[Kernel-packages] [Bug 1832661] Re: Xenial update: 4.4.181 upstream stable release

2019-06-17 Thread Khaled El Mously
Applied patches: * x86/speculation/mds: Revert CPU buffer clear on double fault exit * x86/speculation/mds: Improve CPU buffer clear documentation * ARM: exynos: Fix a leaked reference by adding missing of_node_put * crypto: vmx - fix copy-paste error in CTR mode * crypto: crct10dif-generic - fix

[Kernel-packages] [Bug 1832661] Re: Xenial update: 4.4.181 upstream stable release

2019-06-14 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: linux (Ubuntu Xenial) Status: New => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.