This bug was fixed in the package linux-gcp - 6.11.0-1001.1 --------------- linux-gcp (6.11.0-1001.1) oracular; urgency=medium
* oracular/linux-gcp: 6.11.0-1001.1 -proposed tracker (LP: #2079971) * Packaging resync (LP: #1786013) - [Packaging] update update.conf - [Packaging] debian.gcp/dkms-versions -- update from kernel-versions (main/d2024.08.12) * Miscellaneous Ubuntu changes - [packaging] move to 6.11 and oracular - [Config] updateconfigs following Ubuntu-6.11.0-7.7 rebase - [packaging] sync Build-Depends and Build-Depends-Indep wrt debian.master [ Ubuntu: 6.11.0-7.7 ] * oracular/linux: 6.11.0-7.7 -proposed tracker (LP: #2079949) * update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor4.0.0 [1/99]: LSM: Infrastructure management of the sock security - SAUCE: apparmor4.0.0 [2/99]: LSM: Add the lsmblob data structure. - SAUCE: apparmor4.0.0 [3/99]: LSM: Use lsmblob in security_audit_rule_match - SAUCE: apparmor4.0.0 [4/99]: LSM: Call only one hook for audit rules - SAUCE: apparmor4.0.0 [5/99]: LSM: Add lsmblob_to_secctx hook - SAUCE: apparmor4.0.0 [6/99]: Audit: maintain an lsmblob in audit_context - SAUCE: apparmor4.0.0 [7/99]: LSM: Use lsmblob in security_ipc_getsecid - SAUCE: apparmor4.0.0 [8/99]: Audit: Update shutdown LSM data - SAUCE: apparmor4.0.0 [9/99]: LSM: Use lsmblob in security_current_getsecid - SAUCE: apparmor4.0.0 [10/99]: LSM: Use lsmblob in security_inode_getsecid - SAUCE: apparmor4.0.0 [11/99]: Audit: use an lsmblob in audit_names - SAUCE: apparmor4.0.0 [12/99]: LSM: Create new security_cred_getlsmblob LSM hook - SAUCE: apparmor4.0.0 [13/99]: Audit: Change context data from secid to lsmblob - SAUCE: apparmor4.0.0 [14/99]: Netlabel: Use lsmblob for audit data - SAUCE: apparmor4.0.0 [15/99]: LSM: Ensure the correct LSM context releaser - SAUCE: apparmor4.0.0 [16/99]: LSM: Use lsmcontext in security_secid_to_secctx - SAUCE: apparmor4.0.0 [17/99]: LSM: Use lsmcontext in security_lsmblob_to_secctx - SAUCE: apparmor4.0.0 [18/99]: LSM: Use lsmcontext in security_inode_getsecctx - SAUCE: apparmor4.0.0 [19/99]: LSM: lsmcontext in security_dentry_init_security - SAUCE: apparmor4.0.0 [20/99]: LSM: security_lsmblob_to_secctx module selection - SAUCE: apparmor4.0.0 [21/99]: Audit: Create audit_stamp structure - SAUCE: apparmor4.0.0 [22/99]: Audit: Allow multiple records in an audit_buffer - SAUCE: apparmor4.0.0 [23/99]: Audit: Add record for multiple task security contexts - SAUCE: apparmor4.0.0 [24/99]: audit: multiple subject lsm values for netlabel - SAUCE: apparmor4.0.0 [25/99]: Audit: Add record for multiple object contexts - SAUCE: apparmor4.0.0 [26/99]: LSM: Remove unused lsmcontext_init() - SAUCE: apparmor4.0.0 [27/99]: LSM: Improve logic in security_getprocattr - SAUCE: apparmor4.0.0 [28/99]: LSM: secctx provider check on release - SAUCE: apparmor4.0.0 [29/99]: LSM: Single calls in socket_getpeersec hooks - SAUCE: apparmor4.0.0 [30/99]: LSM: Exclusive secmark usage - SAUCE: apparmor4.0.0 [31/99]: LSM: Identify which LSM handles the context string - SAUCE: apparmor4.0.0 [32/99]: AppArmor: Remove the exclusive flag - SAUCE: apparmor4.0.0 [33/99]: LSM: Add mount opts blob size tracking - SAUCE: apparmor4.0.0 [34/99]: LSM: allocate mnt_opts blobs instead of module specific data - SAUCE: apparmor4.0.0 [35/99]: LSM: Infrastructure management of the key security blob - SAUCE: apparmor4.0.0 [36/99]: LSM: Infrastructure management of the mnt_opts security blob - SAUCE: apparmor4.0.0 [37/99]: LSM: Remove lsmblob scaffolding - SAUCE: apparmor4.0.0 [38/99]: LSM: Allow reservation of netlabel - SAUCE: apparmor4.0.0 [39/99]: LSM: restrict security_cred_getsecid() to a single LSM - SAUCE: apparmor4.0.0 [40/99]: Smack: Remove LSM_FLAG_EXCLUSIVE - SAUCE: apparmor4.0.0 [41/99]: LSM stacking v39: UBUNTU: SAUCE: apparmor4.0.0 [41/99]: add/use fns to print hash string hex value - SAUCE: apparmor4.0.0 [42/99]: patch to provide compatibility with v2.x net rules - SAUCE: apparmor4.0.0 [43/99]: add unpriviled user ns mediation - SAUCE: apparmor4.0.0 [44/99]: Add sysctls for additional controls of unpriv userns restrictions - SAUCE: apparmor4.0.0 [45/99]: af_unix mediation - SAUCE: apparmor4.0.0 [46/99]: Add fine grained mediation of posix mqueues - SAUCE: apparmor4.0.0 [47/99] fixup inode_set_attr - SAUCE: apparmor4.0.0 [48/99]: setup slab cache for audit data - SAUCE: apparmor4.0.0 [49/99]: Improve debug print infrastructure - SAUCE: apparmor4.0.0 [50/99]: add the ability for profiles to have a learning cache - SAUCE: apparmor4.0.0 [51/99]: enable userspace upcall for mediation - SAUCE: apparmor4.0.0 [52/99]: prompt - lock down prompt interface - SAUCE: apparmor4.0.0 [53/99]: prompt - allow controlling of caching of a prompt response - SAUCE: apparmor4.0.0 [54/99]: prompt - add refcount to audit_node in prep or reuse and delete - SAUCE: apparmor4.0.0 [55/99]: prompt - refactor to moving caching to uresponse - SAUCE: apparmor4.0.0 [56/99]: prompt - Improve debug statements - SAUCE: apparmor4.0.0 [57/99]: prompt - fix caching - SAUCE: apparmor4.0.0 [58/99]: prompt - rework build to use append fn, to simplify adding strings - SAUCE: apparmor4.0.0 [59/99]: prompt - refcount notifications - SAUCE: apparmor4.0.0 [60/99]: prompt - add the ability to reply with a profile name - SAUCE: apparmor4.0.0 [61/99]: prompt - fix notification cache when updating - SAUCE: apparmor4.0.0 [62/99]: prompt - add tailglob on name for cache support - SAUCE: apparmor4.0.0 [63/99]: prompt - allow profiles to set prompts as interruptible - SAUCE: apparmor4.0.0 [64/93] v6.8 prompt:fixup interruptible - SAUCE: apparmor4.0.0 [65/99]: prompt - add support for advanced filtering of notifications - SAUCE: apparmor4.0.0 [66/99]: userns - add the ability to reference a global variable for a feature value - SAUCE: apparmor4.0.0 [67/99]: userns - make it so special unconfined profiles can mediate user namespaces - SAUCE: apparmor4.0.0 [68/99]: add io_uring mediation - SAUCE: apparmor4.0.0 [69/99]: apparmor: fix oops when racing to retrieve notification - SAUCE: apparmor4.0.0 [70/99]: apparmor: fix notification header size - SAUCE: apparmor4.0.0 [71/99]: apparmor: fix request field from a prompt reply that denies all access - SAUCE: apparmor4.0.0 [72/99]: apparmor: open userns related sysctl so lxc can check if restriction are in place - SAUCE: apparmor4.0.0 [73/99]: apparmor: cleanup attachment perm lookup to use lookup_perms() - SAUCE: apparmor4.0.0 [74/99]: apparmor: remove redundant unconfined check. - SAUCE: apparmor4.0.0 [75/99]: apparmor: switch signal mediation to using RULE_MEDIATES - SAUCE: apparmor4.0.0 [76/99]: apparmor: ensure labels with more than one entry have correct flags - SAUCE: apparmor4.0.0 [77/99]: apparmor: remove explicit restriction that unconfined cannot use change_hat - SAUCE: apparmor4.0.0 [78/99]: apparmor: cleanup: refactor file_perm() to provide semantics of some checks - SAUCE: apparmor4.0.0 [79/99]: apparmor: carry mediation check on label - SAUCE: apparmor4.0.0 [80/99]: apparmor: convert easy uses of unconfined() to label_mediates() - SAUCE: apparmor4.0.0 [81/99]: apparmor: add additional flags to extended permission. - SAUCE: apparmor4.0.0 [82/99]: apparmor: add support for profiles to define the kill signal - SAUCE: apparmor4.0.0 [83/99]: apparmor: fix x_table_lookup when stacking is not the first entry - SAUCE: apparmor4.0.0 [84/99]: apparmor: allow profile to be transitioned when a user ns is created - SAUCE: apparmor4.0.0 [85/99]: apparmor: add ability to mediate caps with policy state machine - SAUCE: apparmor4.0.0 [86/99]: fixup notify - SAUCE: apparmor4.0.0 [87/99]: apparmor: add fine grained ipv4/ipv6 mediation - SAUCE: apparmor4.0.0 [88/99]: apparmor: disable tailglob responses for now - SAUCE: apparmor4.0.0 [89/99]: apparmor: Fix notify build warnings - SAUCE: apparmor4.0.0 [90/99]: fix reserved mem for when we save ipv6 addresses - SAUCE: apparmor4.0.0 [91/99]: fix address mapping for recvfrom - SAUCE: apparmor4.0.0 [92/99]: apparmor: add support for 2^24 states to the dfa state machine. - SAUCE: apparmor4.0.0 [93/99]: apparmor: advertise to userspace support of user upcall for file rules. - SAUCE: apparmor4.0.0 [94/99]: apparmor: allocate xmatch for nullpdf inside aa_alloc_null - SAUCE: apparmor4.0.0 [95/99]: apparmor: properly handle cx/px lookup failure for complain - SAUCE: apparmor4.0.0 [96/99]: apparmor: fix prompt failing during large down loads - SAUCE: apparmor4.0.0 [97/99]: apparmor: fix allow field in notification - SAUCE: apparmor4.0.0 [98/99]: fix build error with !CONFIG_SECURITY - SAUCE: apparmor4.0.0 [99/99]: fix build error with in nfs4xdr * Intel Lunar Lake / Battlemage enablement (LP: #2076209) - drm/xe/lnl: Drop force_probe requirement - drm/xe: Support 'nomodeset' kernel command-line option - drm/i915/display: Plane capability for 64k phys alignment - drm/xe: Align all VRAM scanout buffers to 64k physical pages when needed. - drm/xe: Use separate rpm lockdep map for non-d3cold-capable devices - drm/xe: Fix NPD in ggtt_node_remove() - drm/xe/bmg: Drop force_probe requirement - drm/xe/gsc: Fix FW status if the firmware is already loaded - drm/xe/gsc: Track the platform in the compatibility version - drm/xe/gsc: Wedge the device if the GSCCS reset fails - drm/i915/bios: Update new entries in VBT BDB block definitions - drm/xe/hwmon: Treat hwmon as a per-device concept - drm/xe: s/xe_tile_migrate_engine/xe_tile_migrate_exec_queue - drm/xe: Add xe_vm_pgtable_update_op to xe_vma_ops - drm/xe: Add xe_exec_queue_last_fence_test_dep - drm/xe: Add timeout to preempt fences - drm/xe: Convert multiple bind ops into single job - drm/xe: Update VM trace events - drm/xe: Update PT layer with better error handling - drm/xe: Add VM bind IOCTL error injection - dma-buf: Split out dma fence array create into alloc and arm functions - drm/xe: Invalidate media_gt TLBs in PT code - drm/i915/display: Fix BMG CCS modifiers - drm/xe: Use xe_pm_runtime_get in xe_bo_move() if reclaim-safe. - drm/xe: Remove extra dma_fence_put on xe_sync_entry_add_deps failure * [24.10 FEAT] [KRN1911] Vertical CPU Polarization Support Stage 2 (LP: #2072760) - s390/wti: Introduce infrastructure for warning track interrupt - s390/wti: Prepare graceful CPU pre-emption on wti reception - s390/wti: Add wti accounting for missed grace periods - s390/wti: Add debugfs file to display missed grace periods per cpu - s390/topology: Add sysctl handler for polarization - s390/topology: Add config option to switch to vertical during boot - s390/smp: Add cpu capacities - s390/hiperdispatch: Introduce hiperdispatch - s390/hiperdispatch: Add steal time averaging - s390/hiperdispatch: Add trace events - s390/hiperdispatch: Add hiperdispatch sysctl interface - s390/hiperdispatch: Add hiperdispatch debug attributes - s390/hiperdispatch: Add hiperdispatch debug counters - [Config] Initial set of new options HIPERDISPATCH_ON and SCHED_TOPOLOGY_VERTICAL to yes for s390x * Remove non-LPAE kernel flavor (LP: #2025265) - [Packaging] Drop control.d/vars.generic-lpae * generate and ship vmlinux.h to allow packages to build BPF CO-RE (LP: #2050083) - [Packaging] Don't call dh_all on linux-bpf-dev unless on master kernel * Miscellaneous Ubuntu changes - [Config] updateconfigs following v6.11-rc7 rebase [ Ubuntu: 6.11.0-6.6 ] * oracular/linux: 6.11.0-6.6 -proposed tracker (LP: #2077949) * Packaging resync (LP: #1786013) - [Packaging] debian.master/dkms-versions -- update from kernel-versions (main/d2024.08.12) - [Packaging] update Ubuntu.md * Pull in latest X13s commits (LP: #2078929) - arm64: dts: qcom: sc8280xp-x13s: disable PCIe perst pull downs - arm64: dts: qcom: sc8280xp-x13s: clean up PCIe2a pinctrl node - media: qcom: camss: Remove use_count guard in stop_streaming - media: qcom: camss: Fix ordering of pm_runtime_enable - arm64: dts: qcom: sc8280xp-x13s: Enable RGB sensor - wifi: ath11k: fix NULL pointer dereference in ath11k_mac_get_eirp_power() - Revert "wifi: ath11k: restore country code during resume" - Revert "wifi: ath11k: support hibernation" - SAUCE: media: ov5675: Fix power on/off delay timings - SAUCE: media: dt-bindings: Document SC8280XP/SM8350 Venus - SAUCE: media: venus: core: Remove trailing commas from of match entries - SAUCE: media: venus: hfi_venus: Support only updating certain bits with presets - SAUCE: media: platform: venus: Add optional LLCC path - SAUCE: media: venus: core: Add SM8350 resource struct - SAUCE: media: venus: core: Add SC8280XP resource struct - SAUCE: arm64: dts: qcom: sc8280xp: Add Venus - SAUCE: arm64: dts: qcom: sc8280xp-x13s: Enable Venus - SAUCE: phy: qcom-qmp-combo: drop regulator loads - SAUCE: phy: qcom-edp: drop regulator loads - SAUCE: i2c: qcom-cci: Stop complaining about DT set clock rate - SAUCE: clk: qcom: gcc-sc8280xp: don't use parking clk_ops for QUPs * Intel Lunar Lake / Battlemage enablement (LP: #2076209) - drm/i915: Skip programming FIA link enable bits for MTL+ - drm/i915: disable fbc due to Wa_16023588340 - drm/xe/xe2lpm: Extend Wa_16021639441 - drm/i915/display: Cache adpative sync caps to use it later - drm/xe: Generate oob before compiling anything - drm/i915/display: WA for Re-initialize dispcnlunitt1 xosc clock - drm/xe/gsc: add Battlemage support - drm/xe/migrate: Handle clear ccs logic for xe2 dgfx - drm/xe/migrate: Add helper function to program identity map - drm/xe/xe2: Introduce identity map for compressed pat for vram - drm/xe/xe_migrate: Handle migration logic for xe2+ dgfx - drm/xe/fbdev: Limit the usage of stolen for LNL+ - drm/xe/uapi: Expose SIMD16 EU mask in topology query - drm/xe: Fix warning on unreachable statement - drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability - drm/i915/hdcp: Add encoder check in hdcp2_get_capability - drm/xe/hdcp: Check GSC structure validity - drm/i915/dp: Clear VSC SDP during post ddi disable routine - drm/xe/huc: Define HuC binary for LNL - drm/xe/gsc: Define GSC binary for LNL - drm/xe/huc: Define HuC binary for BMG - drm/xe/xe2hpg: Introduce performance tuning changes for Xe2_HPG - drm/i915/display/dp: Compute AS SDP when vrr is also enabled - drm/xe: Move and export xe_hw_engine lookup. - drm/xe/xe2: Enable Priority Mem Read - drm/xe/xe2: Introduce performance changes - drm/xe/xe2: Add performance turning changes - drm/xe/guc: Bump minimum required GuC version to v70.29.2 - drm/xe/guc: Define GuC version v70.29.2 for BMG - drm/xe/guc: Enable w/a 14022293748 and 22019794406 - drm/xe: Move enable host l2 VRAM post MCR init - drm/xe: Write all slices if its mcr register - drm/xe: Define STATELESS_COMPRESSION_CTRL as mcr register - drm/i915/pps: Disable DPLS_GATING around pps sequence - drm/xe: fix engine_class bounds check again - drm/xe/uc: Use managed bo for HuC and GSC objects - drm/xe: Use reserved copy engine for user binds on faulting devices - drm/xe/display: Match i915 driver suspend/resume sequences better - drm/i915: move rawclk from runtime to display runtime info - drm/xe/display: drop unused rawclk_freq and RUNTIME_INFO() - drm/i915/psr: Prevent Panel Replay if CRC calculation is enabled - drm/i915/display: Don't enable decompression on Xe2 with Tile4 - drm/fourcc: define Intel Xe2 related tile4 ccs modifiers - drm/i915/display: allow creation of Xe2 ccs framebuffers - drm/xe/display: fix compat IS_DISPLAY_STEP() range end - drm/xe/display: remove intel_display_step_name() to simplify - drm/xe/display: remove the unused compat HAS_GMD_ID() - drm/xe/step: define more steppings E-J - drm/i915/display: rename IS_DISPLAY_IP_RANGE() to IS_DISPLAY_VER_FULL() - drm/i915/display: rename IS_DISPLAY_IP_STEP() to IS_DISPLAY_VER_STEP() - drm/i915/display: identify display steppings in display probe - drm/i915/display: switch to display detected steppings - drm/i915: remove display stepping handling - drm/xe: remove display stepping handling - drm/xe: Removed unused xe_ggtt_printk - drm/xe: Introduce GGTT documentation - drm/xe: Remove unnecessary drm_mm.h includes - drm/{i915, xe}: Avoid direct inspection of dpt_vma from outside dpt - drm/xe: Encapsulate drm_mm_node inside xe_ggtt_node - drm/xe: Rename xe_ggtt_node related functions - drm/xe: Limit drm_mm_node_allocated access to xe_ggtt_node - drm/xe: Introduce xe_ggtt_largest_hole - drm/xe: Introduce xe_ggtt_print_holes - drm/xe: Refactor xe_ggtt balloon functions to make the node clear - drm/xe: Make xe_ggtt_node struct independent - drm/xe: Fix missing runtime outer protection for ggtt_remove_node - drm/xe: Move ggtt_fini to devm managed - drm/xe: Set firmware state to loadable before registering guc_fini_hw - drm/xe: Drop warn on xe_guc_pc_gucrc_disable in guc pc fini - drm/xe: Move hw_engine_fini to devm managed - drm/xe: Update xe_sa to use xe_managed_bo_create_pin_map - drm/xe: Suspend/resume user access only during system s/r - drm/xe: Handle polling only for system s/r in xe_display_pm_suspend/resume() - drm/xe/display: handle HPD polling in display runtime suspend/resume - drm/xe: Fix total initialization in xe_ggtt_print_holes() * Missing device ID for amd_atl for AMD platforms Kraken and Strix-Halo (LP: #2077922) - x86/amd_nb: Add new PCI IDs for AMD family 1Ah model 60h - x86/amd_nb: Add new PCI IDs for AMD family 1Ah model 60h-70h * generate and ship vmlinux.h to allow packages to build BPF CO-RE (LP: #2050083) - [Packaging] add linux-bpf-dev package - [Packaging] do not attempt to generate BTF header on armhf * Fix ethernet performance on JSL and EHL (LP: #2077858) - intel_idle: Disable promotion to C1E on Jasper Lake and Elkhart Lake * Regression: unable to reach low idle states on Tiger Lake (LP: #2072679) - SAUCE: PCI: ASPM: Allow OS to configure ASPM where BIOS is incapable of - SAUCE: PCI: vmd: Let OS control ASPM for devices under VMD domain * Random flickering with Intel i915 (Gen9 GPUs in 6th-8th gen CPUs) on Linux 6.8 (LP: #2062951) - SAUCE: iommu/intel: disable DMAR for SKL integrated gfx * Make linux-tools-common Provide linux-cpupower (LP: #1960841) - [Packaging] Add linux-cpupower to linux-tools-common Provides * Miscellaneous Ubuntu changes - SAUCE: apparmor4.0.0: fix build error with !CONFIG_SECURITY - [Config] updateconfigs following v6.11-rc6 rebase - SAUCE: apparmor4.0.0: fix build after rebase to v6.11-rc6 - [Packaging] perf: reenable libtraceevent [ Ubuntu: 6.11.0-5.5 ] * oracular/linux: 6.11.0-5.5 -proposed tracker (LP: #2077454) * GDS force mitigation re-enabled in 6.10 (and 6.11) causing crashes (LP: #2077145) - [Config] Force disable CONFIG_MITIGATION_GDS_FORCE again * Miscellaneous Ubuntu changes - [Config] updateconfigs following v6.11-rc5 rebase [ Ubuntu: 6.11.0-4.4 ] * oracular/linux: 6.11.0-4.4 -proposed tracker (LP: #2077394) * Packaging resync (LP: #1786013) - [Packaging] update variants * Miscellaneous Ubuntu changes - [Config] Disable CONFIG_DRM_I915_REPLAY_GPU_HANGS_API - [Packaging] carry ELF_PACKAGE_METADATA into relinking - [Packaging] Rename to linux [ Ubuntu: 6.11.0-3.3 ] * dummy entry [ Ubuntu: 6.11.0-3.3 ] * oracular/linux-unstable: 6.11.0-3.3 -proposed tracker (LP: #2077292) * Packaging resync (LP: #1786013) - [Packaging] debian.master/dkms-versions -- update from kernel-versions (main/d2024.08.12) * Disable PCI_DYNAMIC_OF_NODES in Ubuntu (LP: #2074376) - [Config] Disable PCI_DYNAMIC_OF_NODES * Miscellaneous Ubuntu changes - [Config] updateconfigs following v6.11-rc3 rebase [ Ubuntu: 6.11.0-2.2 ] * oracular/linux-unstable: 6.11.0-2.2 -proposed tracker (LP: #2076564) * please help enable more EROFS compression algorithms (LP: #2074049) - [Config] enable LZMA and ZSTD file compressions in EROFS * Enable CONFIG_EXFAT_FS in s390x too (LP: #2076428) - [Config] Enable EXFAT_FS on s390x too * Miscellaneous Ubuntu changes - [Packaging] Disable tools/perf on armhf (FTBFS) - [Config] toolchain version update * Miscellaneous Ubuntu changes - UBUNTU: Rebase on v6.11-rc3 [ Ubuntu: 6.11.0-1.1 ] * oracular/linux-unstable: 6.11.0-1.1 -proposed tracker (LP: #2076116) * Miscellaneous Ubuntu changes - [packaging] move to v6.11 and rename to linux-unstable - [Config] updateconfigs following v6.11-rc2 rebase - SAUCE: hwmon: Fix aaeon driver for 6.11. - debian.master/dkms-versions: temporarily remove all dkms [ Ubuntu: 6.11.0-0.0 ] * Dummy entry. [ Ubuntu: 6.10.0-18.18 ] * oracular/linux: 6.10.0-18.18 -proposed tracker (LP: #2073754) * net:fib_rule_tests.sh in ubuntu_kselftests_net fails on Noble (LP: #2066332) - Revert "UBUNTU: SAUCE: selftests: net: fix "from" match test in fib_rule_tests.sh" * Pull-request to address TPM bypass issue (LP: #2037688) - [Config]: Configure TPM drivers as builtins for arm64 in annotations * kdump doesn't work with UEFI secure boot and kernel lockdown enabled on ARM64 (LP: #2033007) - [Config]: Enable CONFIG_KEXEC_IMAGE_VERIFY_SIG on arm64 * Miscellaneous Ubuntu changes - SAUCE: s390/setup: Fix __pa/__va for modules under non-GPL licenses * Miscellaneous upstream changes - Revert "UBUNTU: [Packaging] debian.master/dkms-versions -- disable zfs for s390x" [ Ubuntu: 6.10.0-17.17 ] * oracular/linux: 6.10.0-17.17 -proposed tracker (LP: #2073091) * Miscellaneous Ubuntu changes - rebase on v6.10 [ Ubuntu: 6.10.0-16.16 ] * oracular/linux: 6.10.0-16.16 -proposed tracker (LP: #2072507) * Miscellaneous Ubuntu changes - rebase on v6.10-rc7 [ Ubuntu: 6.10.0-15.15 ] * oracular/linux: 6.10.0-15.15 -proposed tracker (LP: #2071915) * [UBUNTU 24.04] IOMMU DMA mode changed in kernel config causes massive throughput degradation for PCI-related network workloads (LP: #2071471) - [Config] Set IOMMU_DEFAULT_DMA_STRICT=n and IOMMU_DEFAULT_DMA_LAZY=yes for s390x * Miscellaneous Ubuntu changes - rename to linux [ Ubuntu: 6.10.0-14.14 ] * oracular/linux-unstable: 6.10.0-14.14 -proposed tracker (LP: #2071786) * zfs-dkms FTBFS on Linux 6.10/s390x (LP: #2071774) - [Packaging] debian.master/dkms-versions -- disable zfs for s390x * Packaging resync (LP: #1786013) - [Packaging] debian.master/dkms-versions -- update from kernel-versions (main/d2024.06.11) * update apparmor and LSM stacking patch set (LP: #2028253) - SAUCE: apparmor4.0.0 [42/92]: LSM stacking v39: UBUNTU: SAUCE: apparmor4.0.0 [42/92]: add/use fns to print hash string hex value - SAUCE: apparmor4.0.0 [43/92]: patch to provide compatibility with v2.x net rules - SAUCE: apparmor4.0.0 [44/92]: add unpriviled user ns mediation - SAUCE: apparmor4.0.0 [45/92]: Add sysctls for additional controls of unpriv userns restrictions - SAUCE: apparmor4.0.0 [46/92]: af_unix mediation - SAUCE: apparmor4.0.0 [47/92]: Add fine grained mediation of posix mqueues - SAUCE: apparmor4.0.0 [49/92]: setup slab cache for audit data - SAUCE: apparmor4.0.0 [50/92]: Improve debug print infrastructure - SAUCE: apparmor4.0.0 [51/92]: add the ability for profiles to have a learning cache - SAUCE: apparmor4.0.0 [52/92]: enable userspace upcall for mediation - SAUCE: apparmor4.0.0 [53/92]: prompt - lock down prompt interface - SAUCE: apparmor4.0.0 [54/92]: prompt - allow controlling of caching of a prompt response - SAUCE: apparmor4.0.0 [55/92]: prompt - add refcount to audit_node in prep or reuse and delete - SAUCE: apparmor4.0.0 [56/92]: prompt - refactor to moving caching to uresponse - SAUCE: apparmor4.0.0 [57/92]: prompt - Improve debug statements - SAUCE: apparmor4.0.0 [58/92]: prompt - fix caching - SAUCE: apparmor4.0.0 [59/92]: prompt - rework build to use append fn, to simplify adding strings - SAUCE: apparmor4.0.0 [60/92]: prompt - refcount notifications - SAUCE: apparmor4.0.0 [61/92]: prompt - add the ability to reply with a profile name - SAUCE: apparmor4.0.0 [62/92]: prompt - fix notification cache when updating - SAUCE: apparmor4.0.0 [63/92]: prompt - add tailglob on name for cache support - SAUCE: apparmor4.0.0 [64/92]: prompt - allow profiles to set prompts as interruptible - SAUCE: apparmor4.0.0 [65/93] v6.8 prompt:fixup interruptible - SAUCE: apparmor4.0.0 [69/92]: add io_uring mediation - SAUCE: apparmor4.0.0 [70/92]: apparmor: fix oops when racing to retrieve notification - SAUCE: apparmor4.0.0 [71/92]: apparmor: fix notification header size - SAUCE: apparmor4.0.0 [72/92]: apparmor: fix request field from a prompt reply that denies all access - SAUCE: apparmor4.0.0 [73/92]: apparmor: open userns related sysctl so lxc can check if restriction are in place - SAUCE: apparmor4.0.0 [74/92]: apparmor: cleanup attachment perm lookup to use lookup_perms() - SAUCE: apparmor4.0.0 [75/92]: apparmor: remove redundant unconfined check. - SAUCE: apparmor4.0.0 [76/92]: apparmor: switch signal mediation to using RULE_MEDIATES - SAUCE: apparmor4.0.0 [77/92]: apparmor: ensure labels with more than one entry have correct flags - SAUCE: apparmor4.0.0 [78/92]: apparmor: remove explicit restriction that unconfined cannot use change_hat - SAUCE: apparmor4.0.0 [79/92]: apparmor: cleanup: refactor file_perm() to provide semantics of some checks - SAUCE: apparmor4.0.0 [80/92]: apparmor: carry mediation check on label - SAUCE: apparmor4.0.0 [81/92]: apparmor: convert easy uses of unconfined() to label_mediates() - SAUCE: apparmor4.0.0 [82/92]: apparmor: add additional flags to extended permission. - SAUCE: apparmor4.0.0 [83/92]: apparmor: add support for profiles to define the kill signal - SAUCE: apparmor4.0.0 [84/92]: apparmor: fix x_table_lookup when stacking is not the first entry - SAUCE: apparmor4.0.0 [85/92]: apparmor: allow profile to be transitioned when a user ns is created - SAUCE: apparmor4.0.0 [86/92]: apparmor: add ability to mediate caps with policy state machine - SAUCE: apparmor4.0.0 [87/92]: fixup notify - SAUCE: apparmor4.0.0 [88/92]: apparmor: add fine grained ipv4/ipv6 mediation - SAUCE: apparmor4.0.0 [89/92]: apparmor: disable tailglob responses for now - SAUCE: apparmor4.0.0 [90/92]: apparmor: Fix notify build warnings - SAUCE: apparmor4.0.0 [91/92]: fix reserved mem for when we save ipv6 addresses - [Config] disable CONFIG_SECURITY_APPARMOR_RESTRICT_USERNS * linux-gcp 6.8.0-1005.5 (+ others) Noble kernel regression with new apparmor profiles/features (LP: #2061851) - SAUCE: apparmor4.0.0 [92/92]: fix address mapping for recvfrom * update apparmor and LSM stacking patch set (LP: #2028253) // [FFe] apparmor-4.0.0-alpha2 for unprivileged user namespace restrictions in mantic (LP: #2032602) - SAUCE: apparmor4.0.0 [66/92]: prompt - add support for advanced filtering of notifications - SAUCE: apparmor4.0.0 [67/92]: userns - add the ability to reference a global variable for a feature value - SAUCE: apparmor4.0.0 [68/92]: userns - make it so special unconfined profiles can mediate user namespaces * Miscellaneous Ubuntu changes - SAUCE: apparmor4.0.0 [1/92]: LSM: Infrastructure management of the sock security - SAUCE: apparmor4.0.0 [2/92]: LSM: Add the lsmblob data structure. - SAUCE: apparmor4.0.0 [3/92]: LSM: Use lsmblob in security_audit_rule_match - SAUCE: apparmor4.0.0 [4/92]: LSM: Call only one hook for audit rules - SAUCE: apparmor4.0.0 [5/92]: LSM: Add lsmblob_to_secctx hook - SAUCE: apparmor4.0.0 [6/92]: Audit: maintain an lsmblob in audit_context - SAUCE: apparmor4.0.0 [7/92]: LSM: Use lsmblob in security_ipc_getsecid - SAUCE: apparmor4.0.0 [8/92]: Audit: Update shutdown LSM data - SAUCE: apparmor4.0.0 [9/92]: LSM: Use lsmblob in security_current_getsecid - SAUCE: apparmor4.0.0 [10/92]: LSM: Use lsmblob in security_inode_getsecid - SAUCE: apparmor4.0.0 [11/92]: Audit: use an lsmblob in audit_names - SAUCE: apparmor4.0.0 [12/92]: LSM: Create new security_cred_getlsmblob LSM hook - SAUCE: apparmor4.0.0 [13/92]: Audit: Change context data from secid to lsmblob - SAUCE: apparmor4.0.0 [14/92]: Netlabel: Use lsmblob for audit data - SAUCE: apparmor4.0.0 [15/92]: LSM: Ensure the correct LSM context releaser - SAUCE: apparmor4.0.0 [16/92]: LSM: Use lsmcontext in security_secid_to_secctx - SAUCE: apparmor4.0.0 [17/92]: LSM: Use lsmcontext in security_lsmblob_to_secctx - SAUCE: apparmor4.0.0 [18/92]: LSM: Use lsmcontext in security_inode_getsecctx - SAUCE: apparmor4.0.0 [19/92]: LSM: lsmcontext in security_dentry_init_security - SAUCE: apparmor4.0.0 [20/92]: LSM: security_lsmblob_to_secctx module selection - SAUCE: apparmor4.0.0 [21/92]: Audit: Create audit_stamp structure - SAUCE: apparmor4.0.0 [22/92]: Audit: Allow multiple records in an audit_buffer - SAUCE: apparmor4.0.0 [23/92]: Audit: Add record for multiple task security contexts - SAUCE: apparmor4.0.0 [24/92]: audit: multiple subject lsm values for netlabel - SAUCE: apparmor4.0.0 [25/92]: Audit: Add record for multiple object contexts - SAUCE: apparmor4.0.0 [26/92]: LSM: Remove unused lsmcontext_init() - SAUCE: apparmor4.0.0 [27/92]: LSM: Improve logic in security_getprocattr - SAUCE: apparmor4.0.0 [28/92]: LSM: secctx provider check on release - SAUCE: apparmor4.0.0 [29/92]: LSM: Single calls in socket_getpeersec hooks - SAUCE: apparmor4.0.0 [30/92]: LSM: Exclusive secmark usage - SAUCE: apparmor4.0.0 [31/92]: LSM: Identify which LSM handles the context string - SAUCE: apparmor4.0.0 [32/92]: AppArmor: Remove the exclusive flag - SAUCE: apparmor4.0.0 [33/92]: LSM: Add mount opts blob size tracking - SAUCE: apparmor4.0.0 [34/92]: LSM: allocate mnt_opts blobs instead of module specific data - SAUCE: apparmor4.0.0 [35/92]: LSM: Infrastructure management of the key security blob - SAUCE: apparmor4.0.0 [36/92]: LSM: Infrastructure management of the mnt_opts security blob - SAUCE: apparmor4.0.0 [37/92]: LSM: Remove lsmblob scaffolding - SAUCE: apparmor4.0.0 [38/92]: LSM: Allow reservation of netlabel - SAUCE: apparmor4.0.0 [39/92]: LSM: Correct handling of ENOSYS in inode_setxattr - SAUCE: apparmor4.0.0 [40/92]: LSM: restrict security_cred_getsecid() to a single LSM - SAUCE: apparmor4.0.0 [41/92]: Smack: Remove LSM_FLAG_EXCLUSIVE * Miscellaneous upstream changes - fixup inode_set_attr [ Ubuntu: 6.10.0-13.13 ] * oracular/linux-unstable: 6.10.0-13.13 -proposed tracker (LP: #2071598) * Miscellaneous Ubuntu changes - zfs FTBFS on s390x - temporarily disable it * Miscellaneous Ubuntu changes - rebase on v6.10-rc6 [ Ubuntu: 6.10.0-12.12 ] * oracular/linux-unstable: 6.10.0-12.12 -proposed tracker (LP: #2071461) * Packaging resync (LP: #1786013) - [Packaging] debian.master/dkms-versions -- update from kernel-versions (main/d2024.06.11) * noble:linux: ADT ubuntu-regression-suite misses fakeroot dependency (LP: #2070042) - [DEP-8] Add missing fakeroot dependency * Add Real-time Linux Analysis tool (rtla) to linux-tools (LP: #2059080) - [Packaging] add Real-time Linux Analysis tool (rtla) to linux-tools - [Packaging] update dependencies for rtla * failed to enable IPU6 camera sensor on kernel >= 6.8: ivsc_ace intel_vsc-5db76cf6-0a68-4ed6-9b78-0361635e2447: switch camera to host failed: -110 (LP: #2067364) - SAUCE: media: ivsc: csi: don't count privacy on as error - SAUCE: media: ivsc: csi: add separate lock for v4l2 control handler - SAUCE: media: ivsc: csi: remove privacy status in struct mei_csi - SAUCE: mei: vsc: Enhance IVSC chipset stability during warm reboot - SAUCE: mei: vsc: Enhance SPI transfer of IVSC rom - SAUCE: mei: vsc: Utilize the appropriate byte order swap function - SAUCE: mei: vsc: Prevent timeout error with added delay post-firmware download * Miscellaneous Ubuntu changes - SAUCE: nvme-tcp: Do not terminate commands when in RESETTING - SAUCE: nvme-tcp: make 'err_work' a delayed work - SAUCE: nvme-tcp: delay error recovery until the next KATO interval - SAUCE: nvme-tcp: add recovery_delay to sysfs - [Packaging] rtla: workaround the empty LD variable - [Packaging] Check do_lib_rust before linking Rust lib files - [Config] toolchain version update [ Ubuntu: 6.10.0-11.11 ] * oracular/linux-unstable: 6.10.0-11.11 -proposed tracker (LP: #2070368) * Provide python perf module (LP: #2051560) - [Packaging] enable perf python module - [Packaging] provide a wrapper module for python-perf * Miscellaneous Ubuntu changes - [Config] toolchain version update - [Packaging] Fix python3-setuptools build-dep for tools/perf [ Ubuntu: 6.10.0-10.10 ] * oracular/linux-unstable: 6.10.0-10.10 -proposed tracker (LP: #2070030) * Miscellaneous Ubuntu changes - [Config] arm64: disable RELR - [Config] updateconfigs following v6.10-rc5 rebase * Miscellaneous Ubuntu changes - rebase on v6.10-rc5 [ Ubuntu: 6.10.0-7.7 ] * oracular/linux-unstable: 6.10.0-7.7 -proposed tracker (LP: #2069713) * Packaging resync (LP: #1786013) - [Packaging] debian.master/dkms-versions -- update from kernel-versions (main/d2024.06.11) * Miscellaneous Ubuntu changes - SAUCE: Revert "mm: remove follow_pfn" - [Packaging] debian.master/dkms-versions -- remove zfs-linux [ Ubuntu: 6.10.0-6.6 ] * oracular/linux-unstable: 6.10.0-6.6 -proposed tracker (LP: #2069590) * Miscellaneous Ubuntu changes - rebase on v6.10-rc4 - [Config] updateconfigs following v6.10-rc4 rebase * Miscellaneous Ubuntu changes - rebase on v6.10-rc4 [ Ubuntu: 6.10.0-5.5 ] * oracular/linux-unstable: 6.10.0-5.5 -proposed tracker (LP: #2069031) * Miscellaneous Ubuntu changes - [packaging] remove the kernel configuration for perf - [Packaging] dkms-build: Support DEB822 sources * Miscellaneous Ubuntu changes - rebase on v6.10-rc3 [ Ubuntu: 6.10.0-4.4 ] * oracular/linux-unstable: 6.10.0-4.4 -proposed tracker (LP: #2067887) * Packaging resync (LP: #1786013) - [Packaging] update variants * Miscellaneous Ubuntu changes - rebase on v6.10-rc2 [ Ubuntu: 6.10.0-3.3 ] * oracular/linux-unstable: 6.10.0-3.3 -proposed tracker (LP: #2067718) * Miscellaneous Ubuntu changes - SAUCE: [packaging] `make scripts_gdb` target is broken upstream, to avoid a FTBFS, do not try to install GDB_SCRIPTS [ Ubuntu: 6.10.0-2.2 ] * oracular/linux-unstable: 6.10.0-2.2 -proposed tracker (LP: #2067473) * Miscellaneous Ubuntu changes - SAUCE: update hv_fcopy_daemon target to hv_fcopy_uio_daemon (following upstream rename) * Miscellaneous upstream changes - Revert "UBUNTU: [Packaging] update dependencies for rtla" - Revert "UBUNTU: [Packaging] add Real-time Linux Analysis tool (rtla) to linux-tools" - Revert "UBUNTU: [Packaging] provide a wrapper module for python-perf" - Revert "UBUNTU: [Packaging] enable perf python module" [ Ubuntu: 6.10.0-1.1 ] * oracular/linux-unstable: 6.10.0-1.1 -proposed tracker (LP: #2067390) * Miscellaneous Ubuntu changes - [packaging] move to v6.10 and rename to linux-unstable - [Config] updateconfigs following v6.10-rc1 rebase - SAUCE: (lockdown) security: use default hook return value - debian.master/dkms-versions: temporarily remove all dkms * Miscellaneous Ubuntu changes - rebase on v6.10-rc1 [ Ubuntu: 6.10.0-0.0 ] * noble/linux: 6.8.0-34.34 -proposed tracker (LP: #2065167) * Packaging resync (LP: #1786013) - [Packaging] debian.master/dkms-versions -- update from kernel-versions (main/2024.04.29) -- Paolo Pisati <paolo.pis...@canonical.com> Tue, 10 Sep 2024 09:22:17 +0200 ** Changed in: linux-gcp (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-gcp in Ubuntu. https://bugs.launchpad.net/bugs/2077571 Title: GVE stuck TX queues Status in linux-gcp package in Ubuntu: Fix Released Status in linux-gke package in Ubuntu: New Status in linux-gkeop package in Ubuntu: New Status in linux-gcp source package in Jammy: Fix Committed Status in linux-gke source package in Jammy: Fix Committed Status in linux-gkeop source package in Jammy: Fix Committed Status in linux-gcp source package in Noble: Fix Released Status in linux-gke source package in Noble: Fix Committed Status in linux-gkeop source package in Noble: Invalid Bug description: [Impact] Request from Google to backport a set of patches to address issues in the GVE driver. [Fix] 36e3b949e35964e22b9a57f960660fc599038dd4 (gve: Fix an edge case for TSO skb validity check) 1b9f756344416e02b41439bf2324b26aa25e141c (gve: ignore nonrelevant GSO type bits when processing TSO headers) [Test] Compile and boot tested. [Where problems could occur] Changes are limited to the GVE driver. [Other info] #SF 00389911 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2077571/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp