jammy/linux: 5.15.0-82.91 -proposed tracker

Bug #2031147 reported by Roxana Nicolescu
20
This bug affects 2 people
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Invalid
Medium
Canonical Kernel Team
Boot-testing
Fix Released
Medium
Stefan Bader
Certification-testing
Invalid
Medium
Canonical Hardware Certification
Kernel-signoff
Fix Released
Medium
Canonical Kernel Team
New-review
Fix Released
Medium
Andy Whitcroft
Prepare-package
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Prepare-package-generate
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Prepare-package-lrg
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Prepare-package-lrm
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Prepare-package-lrs
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Prepare-package-meta
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Prepare-package-signed
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Promote-signing-to-proposed
Invalid
Medium
Ubuntu Stable Release Updates Team
Promote-to-proposed
Fix Released
Medium
Ubuntu Stable Release Updates Team
Promote-to-security
Fix Released
Medium
Andy Whitcroft
Promote-to-updates
Fix Released
Medium
Andy Whitcroft
Regression-testing
Fix Released
Medium
Canonical Kernel Team
Security-signoff
Fix Released
Medium
Rodrigo Figueiredo Zaiden
Sru-review
Fix Released
Medium
Andy Whitcroft
Verification-testing
Fix Released
Medium
Canonical Kernel Team
canonical-signing-jobs
Task00
Fix Released
Medium
Andy Whitcroft
linux (Ubuntu)
Jammy
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
built:
  from: f19a2fc9407011e9
  route-entry: 2
delta:
  promote-to-proposed: [lrm, lrs, main, meta, signed, lrg, generate]
  promote-to-security: []
  promote-to-updates: [lrm, lrs, main, meta, signed]
flag:
  boot-testing-requested: true
  bugs-spammed: true
  proposed-announcement-sent: true
  proposed-testing-requested: true
  stream-from-cycle: true
issue: KSRU-9498
packages:
  generate: linux-generate
  lrg: linux-restricted-generate
  lrm: linux-restricted-modules
  lrs: linux-restricted-signatures
  main: linux
  meta: linux-meta
  signed: linux-signed
phase: Complete
phase-changed: Tuesday, 29. August 2023 09:59 UTC
reason: {}
synthetic:
  :promote-to-as-proposed: Invalid
trackers:
  focal/linux-hwe-5.15: bug 2030586
  focal/linux-riscv-5.15: bug 2030587
  jammy/linux-aws: bug 2030549
  jammy/linux-azure: bug 2030553
  jammy/linux-bluefield: bug 2030554
  jammy/linux-fips: bug 2030555
  jammy/linux-gcp: bug 2030557
  jammy/linux-gke: bug 2030558
  jammy/linux-gkeop: bug 2030560
  jammy/linux-ibm: bug 2030562
  jammy/linux-ibm-gt: bug 2030564
  jammy/linux-intel-iotg: bug 2030575
  jammy/linux-kvm: bug 2030576
  jammy/linux-lowlatency: bug 2030578
  jammy/linux-nvidia: bug 2030579
  jammy/linux-oracle: bug 2030581
  jammy/linux-raspi: bug 2030583
  jammy/linux-realtime: bug 2030568
  jammy/linux-uc22: bug 2030585
variant: debs
versions:
  lrm: 5.15.0-82.91
  main: 5.15.0-82.91
  meta: 5.15.0.82.78
  signed: 5.15.0-82.91
~~:
  clamps:
    new-review: f19a2fc9407011e9
    promote-to-proposed: f19a2fc9407011e9
    self: 5.15.0-82.91
    sru-review: f19a2fc9407011e9

tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-s2023.07.10-2
description: updated
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux (Ubuntu Jammy):
importance: Undecided → Medium
tags: added: kernel-block-derivatives
tags: added: kernel-regression-testing-early
Changed in kernel-sru-workflow:
status: Confirmed → Triaged
Revision history for this message
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in linux (Ubuntu Jammy):
status: New → Confirmed
description: updated
Changed in kernel-sru-workflow:
status: Triaged → In Progress
description: updated
tags: added: kernel-jira-issue-ksru-9498
description: updated
summary: - jammy/linux: <version to be filled> -proposed tracker
+ jammy/linux: 5.15.0-81.90 -proposed tracker
description: updated
summary: - jammy/linux: 5.15.0-81.90 -proposed tracker
+ jammy/linux: 5.15.0-82.91 -proposed tracker
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
tags: removed: kernel-block-derivatives
description: updated
description: updated
Revision history for this message
Stefan Bader (smb) wrote :

Boot testing fails on s390x instances because boot testing for SRU cycle prevents the lower versioned security kernel from being booted (those instances are not freshly deployed).

tags: added: boot-testing-passed
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
tags: added: regression-testing-passed
description: updated
tags: added: verification-testing-passed
description: updated
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux - 5.15.0-82.91

---------------
linux (5.15.0-82.91) jammy; urgency=medium

  * jammy/linux: 5.15.0-82.91 -proposed tracker (LP: #2031147)

  * libgnutls report "trap invalid opcode" when trying to install packages over
    https (LP: #2031093)
    - [Config]: disable CONFIG_GDS_FORCE_MITIGATION

 -- Thadeu Lima de Souza Cascardo <email address hidden> Mon, 14 Aug 2023 10:31:08 -0300

Changed in linux (Ubuntu Jammy):
status: Confirmed → Fix Released
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Workflow done!

All tasks have been completed and the bug is being closed

Changed in kernel-sru-workflow:
status: In Progress → Fix Committed
Changed in kernel-sru-workflow:
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Duplicates of this bug

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.