UbuntuUpdates.org

Package "linux-modules-extra-6.8.0-1042-gcp"

This package belongs to a PPA: Canonical Kernel Team

Name: linux-modules-extra-6.8.0-1042-gcp

Description:

Linux kernel extra modules for version 6.8.0 on 64 bit x86 SMP

Latest version: 6.8.0-1042.45~22.04.1
Release: jammy (22.04)
Level: base
Repository: main
Head package: linux-gcp-6.8

Links


Download "linux-modules-extra-6.8.0-1042-gcp"


Other versions of "linux-modules-extra-6.8.0-1042-gcp" in Jammy

Repository Area Version
proposed main 6.8.0-1042.45~22.04.1

Changelog

Version: 6.8.0-1042.45~22.04.1 2025-10-07 23:08:18 UTC
No changelog available yet.
Source diff to previous version

Version: 6.8.0-1038.40~22.04.1 2025-09-05 23:14:05 UTC
No changelog available yet.
Source diff to previous version

Version: 6.8.0-1036.38~22.04.1 2025-08-14 07:08:23 UTC
No changelog available yet.
Source diff to previous version

Version: 6.8.0-1035.37~22.04.1 2025-08-08 23:08:03 UTC
No changelog available yet.
Source diff to previous version

Version: 6.8.0-1033.35~22.04.1 2025-07-03 16:24:29 UTC

 linux-gcp-6.8 (6.8.0-1033.35~22.04.1) jammy; urgency=medium
 .
   * jammy/linux-gcp-6.8: 6.8.0-1033.35~22.04.1 -proposed tracker (LP: #2114639)
 .
   [ Ubuntu-gcp: 6.8.0-1033.35 ]
 .
   * noble/linux-gcp: 6.8.0-1033.35 -proposed tracker (LP: #2114640)
   * linux-gcp: NVIDIA Grace platform support (LP: #2111859)
     - arm64: tlb: Improve __TLBI_VADDR_RANGE()
     - arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES
     - arm64/io: Provide a WC friendly __iowriteXX_copy()
     - net: hns3: Remove io_stop_wc() calls after __iowrite64_copy()
     - PCI: Clear Secondary Status errors after enumeration
     - coresight: Remove unused ETM Perf stubs
     - coresight: Clarify comments around the PID of the sink owner
     - coresight: Move struct coresight_trace_id_map to common header
     - coresight: Expose map arguments in trace ID API
     - coresight: Make CPU id map a property of a trace ID map
     - coresight: Make language around "activated" sinks consistent
     - coresight: Remove ops callback checks
     - coresight: Move mode to struct coresight_device
     - coresight: Remove the 'enable' field.
     - coresight: Move all sysfs code to sysfs file
     - coresight: Remove atomic type from refcnt
     - coresight: Remove unused stubs
     - coresight: Add explicit member initializers to coresight_dev_type
     - coresight: Add helper for atomically taking the device
     - coresight: Add a helper for getting csdev->mode
     - coresight: Use per-sink trace ID maps for Perf sessions
     - coresight: Remove pending trace ID release mechanism
     - coresight: Emit sink ID in the HW_ID packets
     - coresight: Make trace ID map spinlock local to the map
     - perf auxtrace: Allow number of queues to be specified
     - perf cs-etm: Print error for new PERF_RECORD_AUX_OUTPUT_HW_ID versions
     - perf arm-spe/cs-etm: Directly iterate CPU maps
     - perf cs-etm: Use struct perf_cpu as much as possible
     - perf cs-etm: Create decoders after both AUX and HW_ID search passes
     - perf: cs-etm: Allocate queues for all CPUs
     - perf: cs-etm: Move traceid_list to each queue
     - perf: cs-etm: Create decoders based on the trace ID mappings
     - perf: cs-etm: Only save valid trace IDs into files
     - perf: cs-etm: Support version 0.1 of HW_ID packets
     - perf: cs-etm: Print queue number in raw trace dump
     - PCI: Use downstream bridges for distributing resources
     - PCI/DOE: Support discovery version 2
     - cppc_cpufreq: Remove HiSilicon CPPC workaround
     - ACPI/HMAT: Move HMAT messages to pr_debug()
     - Fix mmu notifiers for range-based invalidates
     - perf arm-spe: Rename arm_spe__synth_data_source_generic()
     - perf arm-spe: Rename the common data source encoding
     - perf arm-spe: Support metadata version 2
     - perf arm-spe: Introduce arm_spe__is_homogeneous()
     - perf arm-spe: Use metadata to decide the data source feature
     - perf arm-spe: Remove the unused 'midr' field
     - perf arm-spe: Add Neoverse-V2 to common data source encoding list
     - perf arm-spe: Add Cortex CPUs to common data source encoding list
     - perf: arm_cspmu: nvidia: remove unsupported SCF events
     - perf: arm_cspmu: nvidia: fix sysfs path in the kernel doc
     - perf: arm_cspmu: nvidia: enable NVLINK-C2C port filtering
     - perf: arm_cspmu: nvidia: monitor all ports by default
     - arm64: amu: Delay allocating cpumask for AMU FIE support
     - arch_topology: init capacity_freq_ref to 0
     - cpufreq: Allow arch_freq_get_on_cpu to return an error
     - cpufreq: Introduce an optional cpuinfo_avg_freq sysfs entry
     - arm64: Provide an AMU-based version of arch_freq_get_on_cpu
     - arm64: Update AMU-based freq scale factor on entering idle
     - arm64: Utilize for_each_cpu_wrap for reference lookup
     - [Packaging] gcp: enable CONFIG_CPUFREQ_ARCH_CUR_FREQ
     - [Packaging] gcp: enable CONFIG_ARM64_CONTPTE
     - x86: Stop using weak symbols for __iowrite32_copy()
     - s390: Implement __iowrite32_copy()
     - s390: Stop using weak symbols for __iowrite64_copy()
     - perf arm-spe: Define metadata header version 2
     - tools/include: Sync arm64 headers with the kernel sources
     - arm64/io: add constant-argument check
     - perf cs-etm: Fix the assert() to handle captured and unprocessed cpu
       trace
     - perf arm-spe: Use old behavior when opening old SPE files
     - mm: make folio_pte_batch available outside of mm/memory.c
     - mm: fix folio_pte_batch() on XEN PV
   * backport arm64 THP improvements from 6.9 (LP: #2059316) // linux-gcp:
     NVIDIA Grace platform support (LP: #2111859)
     - arm64/mm: make set_ptes() robust when OAs cross 48-bit boundary
     - arm/pgtable: define PFN_PTE_SHIFT
     - nios2/pgtable: define PFN_PTE_SHIFT
     - powerpc/pgtable: define PFN_PTE_SHIFT
     - riscv/pgtable: define PFN_PTE_SHIFT
     - s390/pgtable: define PFN_PTE_SHIFT
     - sparc/pgtable: define PFN_PTE_SHIFT
     - mm/pgtable: make pte_next_pfn() independent of set_ptes()
     - arm/mm: use pte_next_pfn() in set_ptes()
     - powerpc/mm: use pte_next_pfn() in set_ptes()
     - mm/memory: factor out copying the actual PTE in copy_present_pte()
     - mm/memory: pass PTE to copy_present_pte()
     - mm/memory: optimize fork() with PTE-mapped THP
     - mm/memory: ignore dirty/accessed/soft-dirty bits in folio_pte_batch()
     - mm/memory: ignore writable bit in folio_pte_batch()
     - mm: clarify the spec for set_ptes()
     - mm: thp: batch-collapse PMD with set_ptes()
     - mm: introduce pte_advance_pfn() and use for pte_next_pfn()
     - arm64/mm: convert pte_next_pfn() to pte_advance_pfn()
     - x86/mm: convert pte_next_pfn() to pte_advance_pfn()
     - mm: tidy up pte_next_pfn() definition
     - arm64/mm: convert READ_ONCE(*ptep) to ptep_get(ptep)
     - arm64/mm: convert set_pte_at() to set_ptes(..., 1)
     - arm64/mm: convert ptep_clear() to ptep_get_and_clear()
     - arm64/mm: new ptep layer to manage

2111859 linux-gcp: NVIDIA Grace platform support
2059316 backport arm64 THP improvements from 6.9
2111956 Add SVSM vTPM support for AMD SEV-SNP confidential VMs
2112602 Fix HLT logic execution for TDX VMs
2114174 [UBUNTU 24.04] s390/pci: Fix immediate re-add of PCI function after remove
2110090 System will restart while resuming with SATA HDD or nvme installed with password set
2114239 Noble update: upstream stable patchset 2025-06-12
2109951 kvmppc_set_passthru_irq_hv: Could not assign IRQ map traces are seen when pci device is attached to kvm guest when \
2106558 Latitude 5450 is experiencing packet loss on Ethernet in Ubuntu 22.04
2109609 cpufreq amd-pstate: cpuinfo_max_freq reports incorrect value
2100340 PCI/ACS: Fix 'pci=config_acs=' parameter
2111599 [UBUNTU 24.04] s390/pci: Fix zpci_bus_is_isolated_vf() for non-VF
2106381 nvme/tcp hangs IO on arm
2111953 Noble update: upstream stable patchset 2025-05-29
2112519 raid1: Fix NULL pointer dereference in process_checks()
1786013 Packaging resync
CVE-2025-37946 In the Linux kernel, the following vulnerability has been resolved: s390/pci: Fix duplicate pci_dev_put() in disable_slot() when PF has child VFs W
CVE-2025-37974 In the Linux kernel, the following vulnerability has been resolved: s390/pci: Fix missing check for zpci_create_device() error return The zpci_crea
CVE-2024-56699 In the Linux kernel, the following vulnerability has been resolved: s390/pci: Fix potential double remove of hotplug slot In commit 6ee600bfbe0f ("
CVE-2025-37750 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix UAF in decryption with multichannel After commit f7025d861694
CVE-2025-40364 In the Linux kernel, the following vulnerability has been resolved: io_uring: fix io_req_prep_async with provided buffers io_req_prep_async() can i
CVE-2024-49887 In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to don't panic system for no free segment fault injection f2fs: fix t
CVE-2024-57975 In the Linux kernel, the following vulnerability has been resolved: btrfs: do proper folio cleanup when run_delalloc_nocow() failed [BUG] With CONF
CVE-2025-21714 In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix implicit ODP use after free Prevent double queueing of implicit
CVE-2025-21801 In the Linux kernel, the following vulnerability has been resolved: net: ravb: Fix missing rtnl lock in suspend/resume path Fix the suspend/resume
CVE-2025-21809 In the Linux kernel, the following vulnerability has been resolved: rxrpc, afs: Fix peer hash locking vs RCU callback In its address list, afs now
CVE-2024-58057 In the Linux kernel, the following vulnerability has been resolved: idpf: convert workqueues to unbound When a workqueue is created with `WQ_UNBOUN
CVE-2024-57953 In the Linux kernel, the following vulnerability has been resolved: rtc: tps6594: Fix integer overflow on 32bit systems The problem is this multipl
CVE-2024-57982 In the Linux kernel, the following vulnerability has been resolved: xfrm: state: fix out-of-bounds read during lookup lookup and resize can run in
CVE-2025-21721 In the Linux kernel, the following vulnerability has been resolved: nilfs2: handle errors that nilfs_prepare_chunk() may return Patch series "nilfs
CVE-2025-21722 In the Linux kernel, the following vulnerability has been resolved: nilfs2: do not force clear folio if buffer is referenced Patch series "nilfs2:
CVE-2025-21798 In the Linux kernel, the following vulnerability has been resolved: firewire: test: Fix potential null dereference in firewire kunit test kunit_kza
CVE-2025-21723 In the Linux kernel, the following vulnerability has been resolved: scsi: mpi3mr: Fix possible crash when setting up bsg fails If bsg_setup_queue()
CVE-2025-21724 In the Linux kernel, the following vulnerability has been resolved: iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index() R
CVE-2025-21825 In the Linux kernel, the following vulnerability has been resolved: bpf: Cancel the running bpf_timer through kworker for PREEMPT_RT During the upd
CVE-2024-57990 In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7925: fix off by one in mt7925_load_clc() This comparison should
CVE-2024-57974 In the Linux kernel, the following vulnerability has been resolved: udp: Deal with race between UDP socket address change and rehash If a UDP socke
CVE-2024-57994 In the Linux kernel, the following vulnerability has been resolved: ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple() Jakub adde
CVE-2024-57999 In the Linux kernel, the following vulnerability has been resolved: powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW Power Hypervis
CVE-2024-58054 In the Linux kernel, the following vulnerability has been resolved: staging: media: max96712: fix kernel oops when removing module The following ke
CVE-2024-58055 In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_tcm: Don't free command immediately Don't prematurely free the c
CVE-2024-57979 In the Linux kernel, the following vulnerability has been resolved: pps: Fix a use-after-free On a board running ntpd and gpsd, I'm seeing a consis
CVE-2024-57980 In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix double free in error path If the uvc_status_init() functio
CVE-2024-58056 In the Linux kernel, the following vulnerability has been resolved: remoteproc: core: Fix ida_free call while not allocated In the rproc_alloc() fu
CVE-2025-21705 In the Linux kernel, the following vulnerability has been resolved: mptcp: handle fastopen disconnect correctly Syzbot was able to trigger a data s
CVE-2025-21707 In the Linux kernel, the following vulnerability has been resolved: mptcp: consolidate suboption status MPTCP maintains the received sub-options st
CVE-2024-57981 In the Linux kernel, the following vulnerability has been resolved: usb: xhci: Fix NULL pointer dereference on certain command aborts If a command
CVE-2025-21708 In the Linux kernel, the following vulnerability has been resolved: net: usb: rtl8150: enable basic endpoint checking Syzkaller reports [1] encount
CVE-2025-21826 In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject mismatching sum of field_len with set key length T
CVE-2025-21808 In the Linux kernel, the following vulnerability has been resolved: net: xdp: Disallow attaching device-bound programs in generic mode Device-bound
CVE-2025-21710 In the Linux kernel, the following vulnerability has been resolved: tcp: correct handling of extreme memory squeeze Testing with iperf3 using the "
CVE-2025-21715 In the Linux kernel, the following vulnerability has been resolved: net: davicom: fix UAF in dm9000_drv_remove dm is netdev private data and it can
CVE-2025-21716 In the Linux kernel, the following vulnerability has been resolved: vxlan: Fix uninit-value in vxlan_vnifilter_dump() KMSAN reported an uninit-valu
CVE-2025-21718 In the Linux kernel, the following vulnerability has been resolved: net: rose: fix timer races against user threads Rose timers only acquire the so
CVE-2025-21719 In the Linux kernel, the following vulnerability has been resolved: ipmr: do not call mr_mfc_uses_dev() for unres entries syzbot found that calling
CVE-2025-21802 In the Linux kernel, the following vulnerability has been resolved: net: hns3: fix oops when unload drivers paralleling When unload hclge driver, i
CVE-2024-58058 In the Linux kernel, the following vulnerability has been resolved: ubifs: skip dumping tnc tree when zroot is null Clearing slab cache will free a
CVE-2024-58069 In the Linux kernel, the following vulnerability has been resolved: rtc: pcf85063: fix potential OOB write in PCF85063 NVMEM read The nvmem interfa
CVE-2025-21720 In the Linux kernel, the following vulnerability has been resolved: xfrm: delete intermediate secpath entry in packet offload mode Packets handled
CVE-2025-21803 In the Linux kernel, the following vulnerability has been resolved: LoongArch: Fix warnings during S3 suspend The enable_gpe_wakeup() function call
CVE-2025-21810 In the Linux kernel, the following vulnerability has been resolved: driver core: class: Fix wild pointer dereferences in API class_dev_iter_next()
CVE-2025-21811 In the Linux kernel, the following vulnerability has been resolved: nilfs2: protect access to buffers with no active references nilfs_lookup_dirty_
CVE-2025-21804 In the Linux kernel, the following vulnerability has been resolved: PCI: rcar-ep: Fix incorrect variable used when calling devm_request_mem_region()
CVE-2025-21829 In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]" The Call Trace
CVE-2024-57984 In the Linux kernel, the following vulnerability has been resolved: i3c: dw: Fix use-after-free in dw_i3c_master driver due to race condition In dw
CVE-2024-58034 In the Linux kernel, the following vulnerability has been resolved: memory: tegra20-emc: fix an OF node reference bug in tegra_emc_find_node_by_ram_
CVE-2024-57973 In the Linux kernel, the following vulnerability has been resolved: rdma/cxgb4: Prevent potential integer overflow on 32bit The "gl->tot_len" varia
CVE-2025-21725 In the Linux kernel, the following vulnerability has been resolved: smb: client: fix oops due to unset link speed It isn't guaranteed that NETWORK_
CVE-2025-21726 In the Linux kernel, the following vulnerability has been resolved: padata: avoid UAF for reorder_work Although the previous patch can avoid ps and
CVE-2025-21727 In the Linux kernel, the following vulnerability has been resolved: padata: fix UAF in padata_reorder A bug was found when run ltp test: BUG: KASA
CVE-2025-21728 In the Linux kernel, the following vulnerability has been resolved: bpf: Send signals asynchronously if !preemptible BPF programs can execute in al
CVE-2024-58070 In the Linux kernel, the following vulnerability has been resolved: bpf: bpf_local_storage: Always use bpf_mem_alloc in PREEMPT_RT In PREEMPT_RT, k
CVE-2025-21711 In the Linux kernel, the following vulnerability has been resolved: net/rose: prevent integer overflows in rose_setsockopt() In case of possible un
CVE-2025-21799 In the Linux kernel, the following vulnerability has been resolved: net: ethernet: ti: am65-cpsw: fix freeing IRQ in am65_cpsw_nuss_remove_tx_chns()
CVE-2025-21806 In the Linux kernel, the following vulnerability has been resolved: net: let net.core.dev_weight always be non-zero The following problem was encou
CVE-2025-21830 In the Linux kernel, the following vulnerability has been resolved: landlock: Handle weird files A corrupted filesystem (e.g. bcachefs) might retur
CVE-2025-21828 In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't flush non-uploaded STAs If STA state is pre-moved to AUTH
CVE-2024-58061 In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: prohibit deactivating all links In the internal API this calls
CVE-2024-57993 In the Linux kernel, the following vulnerability has been resolved: HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint chec
CVE-2025-21812 In the Linux kernel, the following vulnerability has been resolved: ax25: rcu protect dev->ax25_ptr syzbot found a lockdep issue [1]. We should re
CVE-2024-58071 In the Linux kernel, the following vulnerability has been resolved: team: prevent adding a device which is already a team device lower Prevent addi
CVE-2024-58063 In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: fix memory leaks and invalid access at probe error path Deinitia
CVE-2024-58072 In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: remove unused check_buddy_priv Commit 2461c7d60f9f ("rtlwifi: Up
CVE-2024-58053 In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix handling of received connection abort Fix the handling of a connecti
CVE-2024-57996 In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: don't allow 1 packet limit The current implementation does
CVE-2024-57997 In the Linux kernel, the following vulnerability has been resolved: wifi: wcn36xx: fix channel survey memory allocation size KASAN reported a memor
CVE-2024-58051 In the Linux kernel, the following vulnerability has been resolved: ipmi: ipmb: Add check devm_kasprintf() returned value devm_kasprintf() can retu
CVE-2024-58068 In the Linux kernel, the following vulnerability has been resolved: OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized If a drive
CVE-2024-57998 In the Linux kernel, the following vulnerability has been resolved: OPP: add index check to assert to avoid buffer overflow in _read_freq() Pass th
CVE-2024-58052 In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_rang
CVE-2024-57986 In the Linux kernel, the following vulnerability has been resolved: HID: core: Fix assumption that Resolution Multipliers must be in Logical Collect
CVE-2025-21731 In the Linux kernel, the following vulnerability has been resolved: nbd: don't allow reconnect after disconnect Following process can cause nbd_con
CVE-2025-37798 In the Linux kernel, the following vulnerability has been resolved: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() After making
CVE-2025-37997 In the Linux kernel, the following vulnerability has been resolved: netfilter: ipset: fix region locking in hash types Region locking introduced in
CVE-2025-22088 In the Linux kernel, the following vulnerability has been resolved: RDMA/erdma: Prevent use-after-free in erdma_accept_newconn() After the erdma_ce
CVE-2025-37890 In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc As



About   -   Send Feedback to @ubuntu_updates