jammy/linux-riscv-6.5: 6.5.0-27.28.1~22.04.1 -proposed tracker

Bug #2055575 reported by Roxana Nicolescu
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Abi-testing
Fix Released
Medium
Unassigned
Automated-testing
Invalid
Medium
Unassigned
Boot-testing
Fix Released
Medium
Unassigned
Certification-testing
Invalid
Medium
Unassigned
New-review
Fix Released
Medium
Timo Aaltonen
Prepare-package
Fix Released
Medium
Hannah Sofie Peuckmann
Prepare-package-meta
Fix Released
Medium
Hannah Sofie Peuckmann
Promote-signing-to-proposed
Invalid
Medium
Unassigned
Promote-to-proposed
Fix Released
Medium
Ubuntu Stable Release Updates Team
Promote-to-security
Fix Released
Medium
Andy Whitcroft
Promote-to-updates
Fix Released
Medium
Andy Whitcroft
Regression-testing
Fix Released
Medium
Canonical Kernel Team
Security-signoff
Fix Released
Medium
Canonical Security Team
Sru-review
Fix Released
Medium
Tim Gardner
Verification-testing
Fix Released
Medium
Canonical Kernel Team
canonical-signing-jobs
Task00
Fix Released
Medium
Timo Aaltonen
linux-riscv-6.5 (Ubuntu)
Jammy
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
built:
  from: 53ae434c4411b96f
  route-entry: 1
comments:
  abi-testing: 1
delta:
  promote-to-proposed: [main, meta]
  promote-to-security: []
  promote-to-updates: [main, meta]
flag:
  boot-testing-requested: true
  bugs-spammed: true
  proposed-announcement-sent: true
  proposed-testing-requested: true
  stream-from-cycle: true
issue: KSRU-11355
kernel-stable-master-bug: 2055576
packages:
  main: linux-riscv-6.5
  meta: linux-meta-riscv-6.5
phase: Complete
phase-changed: Monday, 08. April 2024 21:39 UTC
reason: {}
synthetic:
  :promote-to-as-proposed: Fix Released
variant: debs
versions:
  main: 6.5.0-27.28.1~22.04.1
  meta: 6.5.0.27.28.1~22.04.1
~~:
  announce:
    swm-transition-crankable: 2024-03-18 13:01:38.483195
    swm-transition-peer-reviewable: 2024-03-21 10:47:11.666829
  clamps:
    new-review: 53ae434c4411b96f
    promote-to-proposed: 53ae434c4411b96f
    self: 6.5.0-27.28.1~22.04.1
    sru-review: 53ae434c4411b96f
  tracker:
    last-message: '2024-04-08 22:44:20.037426+00:00'

tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2024.03.04-1
description: updated
tags: added: kernel-sru-backport-of-2055576
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux-riscv-6.5 (Ubuntu Jammy):
importance: Undecided → Medium
Changed in kernel-sru-workflow:
status: Confirmed → Triaged
description: updated
Changed in kernel-sru-workflow:
status: Triaged → In Progress
tags: added: kernel-jira-issue-ksru-11355
description: updated
description: updated
summary: - jammy/linux-riscv-6.5: <version to be filled> -proposed tracker
+ jammy/linux-riscv-6.5: 6.5.0-27.28.1~22.04.1 -proposed tracker
description: updated
tags: added: kernel-jira-in-review
description: updated
description: updated
description: updated
description: updated
tags: removed: kernel-jira-in-review
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Ubuntu Kernel Ancillary Bot (ubuntu-kernel-ancillary-bot) wrote : ABI testing

riscv64/generic canonical-certs.pem unchanged
riscv64/generic canonical-revoked-certs.pem unchanged
riscv64/generic fwinfo unchanged
riscv64/generic modules differs
  @@ -1289,7 +1289,6 @@
   dwmac-dwc-qos-eth
   dwmac-generic
   dwmac-intel-plat
  -dwmac-loongson (accepted)
   dwmac-starfive
   dwmac-sun8i
   dwmac-sunxi
riscv64/generic retpoline unchanged

description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
tags: added: regression-testing-passed
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (41.5 KiB)

This bug was fixed in the package linux-riscv-6.5 - 6.5.0-27.28.1~22.04.1

---------------
linux-riscv-6.5 (6.5.0-27.28.1~22.04.1) jammy; urgency=medium

  * jammy/linux-riscv-6.5: 6.5.0-27.28.1~22.04.1 -proposed tracker
    (LP: #2055575)

  * Packaging resync (LP: #1786013)
    - [Packaging] drop ABI data
    - debian.riscv-6.5/dkms-versions -- update from kernel-versions
      (main/2024.03.04)

  [ Ubuntu: 6.5.0-27.28.1 ]

  * mantic/linux-riscv: 6.5.0-27.28.1 -proposed tracker (LP: #2055576)
  * Packaging resync (LP: #1786013)
    - [Packaging] drop ABI data
    - debian.riscv/dkms-versions -- update from kernel-versions (main/2024.03.04)
  * mantic/linux: 6.5.0-27.28 -proposed tracker (LP: #2055584)
  * Packaging resync (LP: #1786013)
    - [Packaging] drop ABI data
    - [Packaging] update annotations scripts
    - debian.master/dkms-versions -- update from kernel-versions (main/2024.03.04)
  * CVE-2024-26597
    - net: qualcomm: rmnet: fix global oob in rmnet_policy
  * CVE-2024-26599
    - pwm: Fix out-of-bounds access in of_pwm_single_xlate()
  * Drop ABI checks from kernel build (LP: #2055686)
    - [Packaging] Remove in-tree abi checks
  * Cranky update-dkms-versions rollout (LP: #2055685)
    - [Packaging] remove update-dkms-versions
    - Move debian/dkms-versions to debian.master/dkms-versions
    - [Packaging] Replace debian/dkms-versions with $(DEBIAN)/dkms-versions
  * linux: please move erofs.ko (CONFIG_EROFS for EROFS support) from linux-
    modules-extra to linux-modules (LP: #2054809)
    - UBUNTU [Packaging]: Include erofs in linux-modules instead of linux-modules-
      extra
  * performance: Scheduler: ratelimit updating of load_avg (LP: #2053251)
    - sched/fair: Ratelimit update to tg->load_avg
  * IB peer memory feature regressed in 6.5 (LP: #2055082)
    - SAUCE: RDMA/core: Introduce peer memory interface
  * linux-tools-common: man page of usbip[d] is misplaced (LP: #2054094)
    - [Packaging] rules: Put usbip manpages in the correct directory
  * CVE-2024-23851
    - dm: limit the number of targets and parameter size area
  * CVE-2024-23850
    - btrfs: do not ASSERT() if the newly created subvolume already got read
  * x86: performance: tsc: Extend watchdog check exemption to 4-Sockets platform
    (LP: #2054699)
    - x86/tsc: Extend watchdog check exemption to 4-Sockets platform
  * linux: please move dmi-sysfs.ko (CONFIG_DMI_SYSFS for SMBIOS support) from
    linux-modules-extra to linux-modules (LP: #2045561)
    - [Packaging] Move dmi-sysfs.ko into linux-modules
  * Fix AMD brightness issue on AUO panel (LP: #2054773)
    - drm/amdgpu: make damage clips support configurable
  * Mantic update: upstream stable patchset 2024-02-28 (LP: #2055199)
    - f2fs: explicitly null-terminate the xattr list
    - pinctrl: lochnagar: Don't build on MIPS
    - ALSA: hda - Fix speaker and headset mic pin config for CHUWI CoreBook XPro
    - mptcp: fix uninit-value in mptcp_incoming_options
    - wifi: cfg80211: lock wiphy mutex for rfkill poll
    - wifi: avoid offset calculation on NULL pointer
    - wifi: mac80211: handle 320 MHz in ieee80211_ht_cap_ie_to_sta_ht_cap
    - debugfs: fix automount d_fsdata usage
    - nv...

Changed in linux-riscv-6.5 (Ubuntu Jammy):
status: New → Fix Released
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Workflow done!

All tasks have been completed and the bug is being closed

Changed in kernel-sru-workflow:
status: In Progress → Fix Committed
Changed in kernel-sru-workflow:
status: Fix Committed → Fix Released
description: updated
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.