linux-ec2: 2.6.32-354.67 -proposed tracker

Bug #1193202 reported by Brad Figg
10
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Certification-testing
Invalid
Medium
Unassigned
Prepare-package
Fix Released
Medium
Stefan Bader
Prepare-package-meta
Fix Released
Medium
Stefan Bader
Promote-to-proposed
Fix Released
Medium
Adam Conrad
Promote-to-security
Fix Released
Medium
Adam Conrad
Promote-to-updates
Fix Released
Medium
Adam Conrad
Regression-testing
Fix Released
Medium
Paul Larson
Security-signoff
Fix Released
Medium
John Johansen
Upload-to-ppa
Fix Released
Medium
Stefan Bader
Verification-testing
Fix Released
Medium
Canonical Kernel Team
linux-ec2 (Ubuntu)
Invalid
Medium
Unassigned
Lucid
Fix Released
Medium
Unassigned

Bug Description

This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Friday, 21. June 2013 04:03 UTC
kernel-stable-master-bug:1193108
kernel-stable-Certification-testing-end:Friday, 21. June 2013 10:07 UTC
kernel-stable-Prepare-package-end:Friday, 21. June 2013 13:06 UTC
kernel-stable-Promote-to-proposed-start:Friday, 21. June 2013 13:06 UTC
kernel-stable-Promote-to-proposed-end:Friday, 21. June 2013 17:04 UTC
kernel-stable-Verification-testing-start:Friday, 21. June 2013 18:07 UTC
kernel-stable-Security-signoff-start:Friday, 28. June 2013 10:04 UTC
kernel-stable-Verification-testing-end:Friday, 28. June 2013 10:04 UTC
kernel-stable-Regression-testing-start:Friday, 28. June 2013 10:04 UTC
kernel-stable-Security-signoff-end:Friday, 28. June 2013 11:04 UTC
kernel-stable-Regression-testing-end:Friday, 28. June 2013 18:05 UTC
kernel-stable-Promote-to-updates-start:Wednesday, 03. July 2013 08:05 UTC
kernel-stable-Promote-to-updates-end:Wednesday, 03. July 2013 22:05 UTC
kernel-stable-phase:Released
kernel-stable-phase-changed:Thursday, 04. July 2013 00:06 UTC

Revision history for this message
Brad Figg (brad-figg) wrote : Derivative package tracking bug

This tracking bug was opened to be worked from linux-2.6.32-49.111 update (bug 1193108)

tags: added: kernel-release-tracking-bug
tags: added: lucid
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
Changed in linux-ec2 (Ubuntu):
importance: Undecided → Medium
Changed in linux-ec2 (Ubuntu Lucid):
importance: Undecided → Medium
Stefan Bader (smb)
summary: - linux-ec2: <version to be filled> -proposed tracker
+ linux-ec2: 2.6.32-354.67 -proposed tracker
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Revision history for this message
Brad Figg (brad-figg) wrote : Packages available

All builds are complete, packages in this bug can be copied to -proposed.

description: updated
Revision history for this message
Adam Conrad (adconrad) wrote :

Copied to -proposed and overrides adjusted.

Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Revision history for this message
Stefan Bader (smb) wrote :

The two additional changes beside the rebase are just adapting code in xen classic that resides in files that have been copied from x86. The original x86 changes were very specific to either hardware or situations. So unlikely it can be verified directly on EC2. Ran the security-regression test over a 32 and 64 bit PVM on my test system without issues. That should be as good as it gets.

Brad Figg (brad-figg)
description: updated
Revision history for this message
John Johansen (jjohansen) wrote :

Looks good

Brad Figg (brad-figg)
description: updated
Paul Larson (pwlars)
tags: added: qa-testing-passed
Brad Figg (brad-figg)
description: updated
Brad Figg (brad-figg)
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (10.7 KiB)

This bug was fixed in the package linux-ec2 - 2.6.32-354.67

---------------
linux-ec2 (2.6.32-354.67) lucid-proposed; urgency=low

  [ Stefan Bader ]

  * Rebased to Ubuntu-2.6.32-49.111
  * SAUCE: ec2: Backport x86/mm: Check if PUD is large when validating a
    kernel address
    - LP: #1193044
  * SAUCE: ec2: Backport x86, ioapic: initialize nr_ioapic_registers early
    in mp_register_ioapic()
    - LP: #1193044
  * Release Tracking Bug
    - LP: #1193202

  [ Ubuntu: 2.6.32-49.111 ]

  * Revert "pcdp: use early_ioremap/early_iounmap to access pcdp table"
    - LP: #1193044
  * Revert "block: improve queue_should_plug() by looking at IO depths"
    - LP: #1193044
  * kernel/signal.c: stop info leak via the tkill and the tgkill syscalls
    - LP: #1187732
    - CVE-2013-2141
  * b43: stop format string leaking into error msgs
    - LP: #1189833
    - CVE-2013-2852
  * 2.6.32.y: timekeeping: Fix nohz issue with commit
    61b76840ddee647c0c223365378c3f394355b7d7
    - LP: #1193044
  * clockevents: Don't allow dummy broadcast timers
    - LP: #1193044
  * posix-cpu-timers: Fix nanosleep task_struct leak
    - LP: #1193044
  * timer: Don't reinitialize the cpu base lock during CPU_UP_PREPARE
    - LP: #1193044
  * tick: Cleanup NOHZ per cpu data on cpu down
    - LP: #1193044
  * kbuild: Fix gcc -x syntax
    - LP: #1193044
  * gen_init_cpio: avoid stack overflow when expanding
    - LP: #1193044
  * coredump: prevent double-free on an error path in core dumper
    - LP: #1193044
  * kernel/sys.c: call disable_nonboot_cpus() in kernel_restart()
    - LP: #1193044
  * ring-buffer: Fix race between integrity check and readers
    - LP: #1193044
  * genalloc: stop crashing the system when destroying a pool
    - LP: #1193044
  * kernel/resource.c: fix stack overflow in __reserve_region_with_split()
    - LP: #1193044
  * Driver core: treat unregistered bus_types as having no devices
    - LP: #1193044
  * cgroup: remove incorrect dget/dput() pair in cgroup_create_dir()
    - LP: #1193044
  * Fix a dead loop in async_synchronize_full()
    - LP: #1193044
  * tracing: Don't call page_to_pfn() if page is NULL
    - LP: #1193044
  * tracing: Fix double free when function profile init failed
    - LP: #1193044
  * mm: Fix PageHead when !CONFIG_PAGEFLAGS_EXTENDED
    - LP: #1193044
  * mm: bugfix: set current->reclaim_state to NULL while returning from
    kswapd()
    - LP: #1193044
  * mm: fix invalidate_complete_page2() lock ordering
    - LP: #1193044
  * mempolicy: fix a race in shared_policy_replace()
    - LP: #1193044
  * ALSA: hda - More ALC663 fixes and support of compatible chips
    - LP: #1193044
  * ALSA: hda - Add a pin-fix for FSC Amilo Pi1505
    - LP: #1193044
  * ALSA: seq: Fix missing error handling in snd_seq_timer_open()
    - LP: #1193044
  * ALSA: ac97 - Fix missing NULL check in snd_ac97_cvol_new()
    - LP: #1193044
  * x86, ioapic: initialize nr_ioapic_registers early in
    mp_register_ioapic()
    - LP: #1193044
  * x86: Don't use the EFI reboot method by default
    - LP: #1193044
  * x86, random: make ARCH_RANDOM prompt if EMBEDDED, not EXPERT
    - LP: #1193044
  * x86/mm: Check if PUD is large when validating a kernel...

Changed in linux-ec2 (Ubuntu Lucid):
status: New → Fix Released
Revision history for this message
Adam Conrad (adconrad) wrote : Update Released

The verification of this Stable Release Update has completed successfully and the package has now been released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regresssions.

Brad Figg (brad-figg)
description: updated
Revision history for this message
Brad Figg (brad-figg) wrote : Package Released!

The package has been published and the bug is being set to Fix Released

Changed in kernel-sru-workflow:
status: In Progress → Fix Released
description: updated
Brad Figg (brad-figg)
Changed in linux-ec2 (Ubuntu):
status: New → Invalid
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.