focal/linux-azure-5.15: 5.15.0-1021.26~20.04.1 -proposed tracker

Bug #1989753 reported by Stefan Bader
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Fix Released
Medium
Tim Gardner
Boot-testing
Fix Released
Medium
Unassigned
Certification-testing
Invalid
Medium
Unassigned
New-review
Fix Released
Medium
Andy Whitcroft
Prepare-package
Fix Released
Medium
Tim Gardner
Prepare-package-lrg
Fix Released
Medium
Tim Gardner
Prepare-package-lrm
Fix Released
Medium
Tim Gardner
Prepare-package-lrs
Fix Released
Medium
Tim Gardner
Prepare-package-meta
Fix Released
Medium
Tim Gardner
Prepare-package-signed
Fix Released
Medium
Tim Gardner
Promote-signing-to-proposed
Invalid
Medium
Unassigned
Promote-to-proposed
Fix Released
Medium
Ubuntu Stable Release Updates Team
Promote-to-security
Fix Released
Medium
Andy Whitcroft
Promote-to-updates
Fix Released
Medium
Andy Whitcroft
Regression-testing
Fix Released
Medium
Canonical Kernel Team
Security-signoff
Fix Released
Medium
Canonical Security Team
Sru-review
Fix Released
Medium
Andy Whitcroft
Stakeholder-signoff
Fix Released
Medium
linux-azure stakeholder signoff
Verification-testing
Fix Released
Medium
Canonical Kernel Team
linux-azure-5.15 (Ubuntu)
Focal
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
built:
  from: 2697cd870b271faf
  route-entry: 1
delta:
  promote-to-proposed: [signed, lrs, lrm, meta, main, lrg]
  promote-to-security: []
  promote-to-updates: [main, lrm, meta, signed, lrs]
flag:
  boot-testing-requested: true
  bugs-spammed: true
  proposed-announcement-sent: true
  proposed-testing-requested: true
issue: KSRU-4937
kernel-stable-master-bug: 1989754
packages:
  lrg: linux-restricted-generate-azure-5.15
  lrm: linux-restricted-modules-azure-5.15
  lrs: linux-restricted-signatures-azure-5.15
  main: linux-azure-5.15
  meta: linux-meta-azure-5.15
  signed: linux-signed-azure-5.15
phase: Complete
phase-changed: Monday, 10. October 2022 13:54 UTC
reason: {}
synthetic:
  :promote-to-as-proposed: Fix Released
trackers:
  focal/linux-azure-fde-5.15: bug 1989752
variant: debs
versions:
  lrm: 5.15.0-1021.26~20.04.1
  main: 5.15.0-1021.26~20.04.1
  meta: 5.15.0.1021.26~20.04.14
  signed: 5.15.0-1021.26~20.04.1
~~:
  clamps:
    new-review: 2697cd870b271faf
    promote-to-proposed: 2697cd870b271faf
    self: 5.15.0-1021.26~20.04.1
    sru-review: 2697cd870b271faf

CVE References

Stefan Bader (smb)
tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2022.09.19-1
description: updated
tags: added: kernel-sru-backport-of-1989754
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux-azure-5.15 (Ubuntu Focal):
importance: Undecided → Medium
Changed in kernel-sru-workflow:
status: Confirmed → Triaged
description: updated
Changed in kernel-sru-workflow:
status: Triaged → In Progress
tags: added: kernel-jira-issue-ksru-4937
description: updated
description: updated
Tim Gardner (timg-tpi)
summary: - focal/linux-azure-5.15: <version to be filled> -proposed tracker
+ focal/linux-azure-5.15: 5.15.0-1021.26~20.04.1 -proposed tracker
description: updated
description: updated
description: updated
Andy Whitcroft (apw)
tags: added: kernel-signing-bot
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Tim Gardner (timg-tpi) wrote :

ADT: lttng-modules from -proposed works OK

tags: added: automated-testing-passed
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (44.2 KiB)

This bug was fixed in the package linux-azure-5.15 - 5.15.0-1021.26~20.04.1

---------------
linux-azure-5.15 (5.15.0-1021.26~20.04.1) focal; urgency=medium

  * focal/linux-azure-5.15: 5.15.0-1021.26~20.04.1 -proposed tracker
    (LP: #1989753)

  [ Ubuntu: 5.15.0-1021.26 ]

  * jammy/linux-azure: 5.15.0-1021.26 -proposed tracker (LP: #1989754)
  * Packaging resync (LP: #1786013)
    - [Packaging] update variants
  * Azure: Enable vPCI multi-MSI interrupts (LP: #1990184)
    - genirq/msi: Guard sysfs code
    - genirq/msi: Remove unused domain callbacks
    - genirq/msi: Fixup includes
    - PCI/MSI: Make pci_msi_domain_write_msg() static
    - PCI/MSI: Remove msi_desc_to_pci_sysdata()
    - genirq/msi, treewide: Use a named struct for PCI/MSI attributes
    - PCI: hv: Fix multi-MSI to allow more than one MSI vector
    - PCI: hv: Avoid the retarget interrupt hypercall in irq_unmask() on ARM64
    - PCI: hv: Fix hv_arch_irq_unmask() for multi-MSI
    - PCI: hv: Reuse existing IRTE allocation in compose_msi_msg()
    - PCI: hv: Fix interrupt mapping for multi-MSI
    - SAUCE: PCI: hv: Only reuse existing IRTE allocation for Multi-MSI
  * Azure: Add support for multi-MSI (LP: #1981577) // Azure: Enable vPCI multi-
    MSI interrupts (LP: #1990184)
    - PCI: hv: Remove unused hv_set_msi_entry_from_desc()
  * cma alloc failure in large 5.15 arm instances (LP: #1990167)
    - [Config] Disable CONFIG_CMA for arm64
  * jammy/linux: 5.15.0-50.56 -proposed tracker (LP: #1990148)
  * CVE-2022-3176
    - io_uring: refactor poll update
    - io_uring: move common poll bits
    - io_uring: kill poll linking optimisation
    - io_uring: inline io_poll_complete
    - io_uring: correct fill events helpers types
    - io_uring: clean cqe filling functions
    - io_uring: poll rework
    - io_uring: remove poll entry from list when canceling all
    - io_uring: bump poll refs to full 31-bits
    - io_uring: fail links when poll fails
    - io_uring: fix wrong arm_poll error handling
    - io_uring: fix UAF due to missing POLLFREE handling
  * ip/nexthop: fix default address selection for connected nexthop
    (LP: #1988809)
    - selftests/net: test nexthop without gw
  * ip/nexthop: fix default address selection for connected nexthop
    (LP: #1988809) // icmp_redirect.sh in ubuntu_kernel_selftests failed on
    Jammy 5.15.0-49.55 (LP: #1990124)
    - ip: fix triggering of 'icmp redirect'
  * jammy/linux: 5.15.0-49.55 -proposed tracker (LP: #1989785)
  * amdgpu module crash after 5.15 kernel update (LP: #1981883)
    - drm/amdgpu: fix check in fbdev init
  * scsi: hisi_sas: Increase debugfs_dump_index after dump is  completed
    (LP: #1982070)
    - scsi: hisi_sas: Increase debugfs_dump_index after dump is completed
  * [UBUNTU 22.04] s390/qeth: cache link_info for ethtool (LP: #1984103)
    - s390/qeth: cache link_info for ethtool
  * WARN in trace_event_dyn_put_ref (LP: #1987232)
    - tracing/perf: Fix double put of trace event when init fails
  * Jammy update: v5.15.60 upstream stable release (LP: #1989221)
    - x86/speculation: Make all RETbleed mitigations 64-bit only
    - selftests/bpf: Extend verifier and bpf_sock tests for dst_port loads
    - s...

Changed in linux-azure-5.15 (Ubuntu Focal):
status: New → Fix Released
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Workflow done!

All tasks have been completed and the bug is being closed

Changed in kernel-sru-workflow:
status: In Progress → Fix Committed
Changed in kernel-sru-workflow:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.