jammy/linux-riscv: 5.15.0-1002.2 -proposed tracker

Bug #1959212 reported by Andrea Righi
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Invalid
Medium
Unassigned
Boot-testing
New
Medium
Unassigned
Prepare-package
Fix Committed
Medium
Andrea Righi
Prepare-package-meta
Fix Committed
Medium
Andrea Righi
Promote-signing-to-proposed
Invalid
Medium
Unassigned
Promote-to-proposed
New
Medium
Canonical Kernel Team
Promote-to-release
New
Medium
Ubuntu Package Archive Administrators
Regression-testing
New
Medium
Canonical Kernel Team
Sru-review
Fix Released
Medium
Andy Whitcroft
linux-riscv (Ubuntu)
Jammy
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
built:
  route-entry: 2
delta:
  sru-review:
  - meta
  - main
kernel-stable-master-bug: 1958638
packages:
  main: linux-riscv
  meta: linux-meta-riscv
phase: Packaging
phase-changed: Thursday, 27. January 2022 17:52 UTC
reason:
  :prepare-packages: Stalled -- build FAILED in ppa (main:F meta:D)
  prepare-package: Ongoing -- main package not yet fully built
  prepare-package-meta: Ongoing -- meta package not yet fully built
variant: debs
versions:
  main: 5.15.0-1002.2
  meta: 5.15.0.1002.2
  source: 5.15.0-1002.2

Andrea Righi (arighi)
tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-d2022.01.21-2
description: updated
description: updated
tags: added: kernel-sru-derivative-of-1958638
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux-riscv (Ubuntu Jammy):
importance: Undecided → Medium
Changed in kernel-sru-workflow:
status: Confirmed → Triaged
Revision history for this message
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in linux-riscv (Ubuntu Jammy):
status: New → Confirmed
description: updated
Changed in kernel-sru-workflow:
status: Triaged → In Progress
Andrea Righi (arighi)
summary: - jammy/linux-riscv: <version to be filled> -proposed tracker
+ jammy/linux-riscv: 5.15.0-1002.2 -proposed tracker
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (83.1 KiB)

This bug was fixed in the package linux-riscv - 5.15.0-1004.4

---------------
linux-riscv (5.15.0-1004.4) jammy; urgency=medium

  * jammy/linux-riscv: 5.15.0-1004.4 -proposed tracker (LP: #1960420)

  * Packaging resync (LP: #1786013)
    - [Packaging] resync getabis

  * Miscellaneous Ubuntu changes
    - [Config] update toolchain versions

  [ Ubuntu: 5.15.0-22.22 ]

  * jammy/linux: 5.15.0-22.22 -proposed tracker (LP: #1960290)

  [ Ubuntu: 5.15.0-21.21 ]

  * jammy/linux: 5.15.0-21.21 -proposed tracker (LP: #1960211)
  * Miscellaneous Ubuntu changes
    - [packaging] unhook lowlatency flavours from the build

  [ Ubuntu: 5.15.0-20.20 ]

  * jammy/linux: 5.15.0-20.20 -proposed tracker (LP: #1959881)
  * Jammy update: v5.15.19 upstream stable release (LP: #1959879)
    - can: m_can: m_can_fifo_{read,write}: don't read or write from/to FIFO if
      length is 0
    - net: sfp: ignore disabled SFP node
    - net: stmmac: configure PTP clock source prior to PTP initialization
    - net: stmmac: skip only stmmac_ptp_register when resume from suspend
    - ARM: 9179/1: uaccess: avoid alignment faults in
      copy_[from|to]_kernel_nofault
    - ARM: 9180/1: Thumb2: align ALT_UP() sections in modules sufficiently
    - KVM: arm64: Use shadow SPSR_EL1 when injecting exceptions on !VHE
    - s390/hypfs: include z/VM guests with access control group set
    - s390/nmi: handle guarded storage validity failures for KVM guests
    - s390/nmi: handle vector validity failures for KVM guests
    - bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack()
    - powerpc32/bpf: Fix codegen for bpf-to-bpf calls
    - powerpc/bpf: Update ldimm64 instructions during extra pass
    - scsi: zfcp: Fix failed recovery on gone remote port with non-NPIV FCP
      devices
    - udf: Restore i_lenAlloc when inode expansion fails
    - udf: Fix NULL ptr deref when converting from inline format
    - efi: runtime: avoid EFIv2 runtime services on Apple x86 machines
    - PM: wakeup: simplify the output logic of pm_show_wakelocks()
    - tracing/histogram: Fix a potential memory leak for kstrdup()
    - tracing: Don't inc err_log entry count if entry allocation fails
    - ceph: properly put ceph_string reference after async create attempt
    - ceph: set pool_ns in new inode layout for async creates
    - fsnotify: fix fsnotify hooks in pseudo filesystems
    - Revert "KVM: SVM: avoid infinite loop on NPF from bad address"
    - psi: Fix uaf issue when psi trigger is destroyed while being polled
    - powerpc/audit: Fix syscall_get_arch()
    - perf/x86/intel/uncore: Fix CAS_COUNT_WRITE issue for ICX
    - perf/x86/intel: Add a quirk for the calculation of the number of counters on
      Alder Lake
    - drm/etnaviv: relax submit size limits
    - drm/atomic: Add the crtc to affected crtc only if uapi.enable = true
    - drm/amd/display: Fix FP start/end for dcn30_internal_validate_bw.
    - KVM: LAPIC: Also cancel preemption timer during SET_LAPIC
    - KVM: SVM: Never reject emulation due to SMAP errata for !SEV guests
    - KVM: SVM: Don't intercept #GP for SEV guests
    - KVM: x86: nSVM: skip eax alignment check for non-SVM instructions
    - KVM: x86: Forc...

Changed in linux-riscv (Ubuntu Jammy):
status: Confirmed → Fix Released
Andy Whitcroft (apw)
tags: removed: kernel-release-tracking-bug-live
Changed in kernel-sru-workflow:
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.