jammy/linux-azure: 5.15.0-1016.19 -proposed tracker

Bug #1982619 reported by Luke Nowakowski-Krijger
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Committed
Medium
Unassigned
Automated-testing
In Progress
Medium
Canonical Kernel Team
Boot-testing
Fix Released
Medium
Unassigned
Certification-testing
Invalid
Medium
Unassigned
New-review
Fix Released
Medium
Andy Whitcroft
Prepare-package
Fix Released
Medium
Tim Gardner
Prepare-package-lrg
Fix Released
Medium
Tim Gardner
Prepare-package-lrm
Fix Released
Medium
Tim Gardner
Prepare-package-lrs
Fix Released
Medium
Tim Gardner
Prepare-package-meta
Fix Released
Medium
Tim Gardner
Prepare-package-signed
Fix Released
Medium
Tim Gardner
Promote-signing-to-proposed
Invalid
Medium
Unassigned
Promote-to-proposed
Fix Released
Medium
Ubuntu Stable Release Updates Team
Promote-to-security
New
Medium
Ubuntu Stable Release Updates Team
Promote-to-updates
New
Medium
Ubuntu Stable Release Updates Team
Regression-testing
Fix Released
Medium
Canonical Kernel Team
Security-signoff
Fix Released
Medium
Steve Beattie
Sru-review
Fix Released
Medium
Andy Whitcroft
Stakeholder-signoff
Fix Released
Medium
linux-azure stakeholder signoff
Verification-testing
Fix Released
Medium
Canonical Kernel Team
linux-azure (Ubuntu)
Jammy
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
boot-testing-requested: true
bugs-spammed: true
built:
  from: c2b83b7ac42685b6
  route-entry: 1
delta:
  promote-to-proposed: [lrm, main, signed, lrs, meta, lrg]
flag:
  boot-testing-requested: true
  bugs-spammed: true
  proposed-announcement-sent: true
  proposed-testing-requested: true
issue: KSRU-4499
kernel-stable-master-bug: 1983684
packages:
  lrg: linux-restricted-generate-azure
  lrm: linux-restricted-modules-azure
  lrs: linux-restricted-signatures-azure
  main: linux-azure
  meta: linux-meta-azure
  signed: linux-signed-azure
phase: Testing
phase-changed: Thursday, 04. August 2022 15:53 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason:
  automated-testing: Ongoing -s testing in progress
synthetic:
  :promote-to-as-proposed: Fix Released
trackers:
  focal/linux-azure-5.15: bug 1982620
variant: debs
versions:
  lrm: 5.15.0-1016.19
  main: 5.15.0-1016.19
  meta: 5.15.0.1016.15
  signed: 5.15.0-1016.19
~~:
  clamps:
    new-review: c2b83b7ac42685b6
    promote-to-proposed: c2b83b7ac42685b6
    self: 5.15.0-1016.19
    sru-review: c2b83b7ac42685b6

tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2022.07.11-3
description: updated
description: updated
tags: added: kernel-sru-derivative-of-1981243
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux-azure (Ubuntu Jammy):
importance: Undecided → Medium
Changed in kernel-sru-workflow:
status: Confirmed → Triaged
Revision history for this message
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in linux-azure (Ubuntu Jammy):
status: New → Confirmed
description: updated
Changed in kernel-sru-workflow:
status: Triaged → In Progress
Tim Gardner (timg-tpi)
summary: - jammy/linux-azure: <version to be filled> -proposed tracker
+ jammy/linux-azure: 5.15.0-1016.19 -proposed tracker
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Andy Whitcroft (apw)
tags: added: kernel-signing-bot
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
tags: added: kernel-jira-issue-ksru-4499
description: updated
description: updated
description: updated
Brad Figg (brad-figg)
description: updated
tags: removed: kernel-sru-derivative-of-1981243
tags: added: kernel-sru-derivative-of-1983684
description: updated
Brad Figg (brad-figg)
description: updated
description: updated
Stefan Bader (smb)
description: updated
description: updated
Changed in kernel-sru-workflow:
status: In Progress → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (10.8 KiB)

This bug was fixed in the package linux-azure - 5.15.0-1017.20

---------------
linux-azure (5.15.0-1017.20) jammy; urgency=medium

  [ Ubuntu: 5.15.0-46.49 ]

  * CVE-2022-2585
    - SAUCE: posix-cpu-timers: Cleanup CPU timers before freeing them during exec
  * CVE-2022-2586
    - SAUCE: netfilter: nf_tables: do not allow SET_ID to refer to another table
    - SAUCE: netfilter: nf_tables: do not allow CHAIN_ID to refer to another table
    - SAUCE: netfilter: nf_tables: do not allow RULE_ID to refer to another chain
  * CVE-2022-2588
    - SAUCE: net_sched: cls_route: remove from list when handle is 0

linux-azure (5.15.0-1016.19) jammy; urgency=medium

  * jammy/linux-azure: 5.15.0-1016.19 -proposed tracker (LP: #1982619)

  * Azure: multi-MSI patches break fio tests on NVMe (LP: #1982613)
    - Revert "PCI: hv: Fix interrupt mapping for multi-MSI"
    - Revert "PCI: hv: Reuse existing IRTE allocation in compose_msi_msg()"
    - Revert "PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI"
    - Revert "PCI: hv: Remove unused hv_set_msi_entry_from_desc()"
    - Revert "PCI: hv: Avoid the retarget interrupt hypercall in irq_unmask() on
      ARM64"
    - Revert "PCI: hv: Fix multi-MSI to allow more than one MSI vector"
    - Revert "genirq/msi, treewide: Use a named struct for PCI/MSI attributes"
    - Revert "PCI/MSI: Remove msi_desc_to_pci_sysdata()"
    - Revert "PCI/MSI: Make pci_msi_domain_write_msg() static"
    - Revert "genirq/msi: Fixup includes"
    - Revert "genirq/msi: Remove unused domain callbacks"
    - Revert "genirq/msi: Guard sysfs code"

linux-azure (5.15.0-1015.18) jammy; urgency=medium

  * jammy/linux-azure: 5.15.0-1015.18 -proposed tracker (LP: #1982272)

  * Azure: Add support for multi-MSI (LP: #1981577)
    - genirq/msi: Guard sysfs code
    - genirq/msi: Remove unused domain callbacks
    - genirq/msi: Fixup includes
    - PCI/MSI: Make pci_msi_domain_write_msg() static
    - PCI/MSI: Remove msi_desc_to_pci_sysdata()
    - genirq/msi, treewide: Use a named struct for PCI/MSI attributes
    - PCI: hv: Fix multi-MSI to allow more than one MSI vector
    - PCI: hv: Avoid the retarget interrupt hypercall in irq_unmask() on ARM64
    - PCI: hv: Remove unused hv_set_msi_entry_from_desc()
    - PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI
    - PCI: hv: Reuse existing IRTE allocation in compose_msi_msg()
    - PCI: hv: Fix interrupt mapping for multi-MSI

  * AMD ACP 6.x DMIC Supports (LP: #1949245)
    - [Config] azure: Disable AMD ACP 6 DMIC Support

  * Ubuntu 22.04 and 20.04 DPC Fixes for Failure Cases of DownPort Containment
    events (LP: #1965241)
    - [Config] azure: Enable config option CONFIG_PCIE_EDR

  * CVE-2022-29900 // CVE-2022-29901
    - [Config]: azure: Enable speculation mitigations

  * Packaging resync (LP: #1786013)
    - debian/dkms-versions -- update from kernel-versions (main/2022.07.11)

  [ Ubuntu: 5.15.0-45.48 ]

  * CVE-2022-29900 // CVE-2022-29901
    - x86/lib/atomic64_386_32: Rename things
    - x86: Prepare asm files for straight-line-speculation
    - x86: Prepare inline-asm for straight-line-speculation
    - x86/alternative: Relax text_poke_bp() constraint
    - kbuild: move objtool_ar...

Changed in linux-azure (Ubuntu Jammy):
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.