<< is it possible to also include the fix for the issue injected in previous kernel update 5.15.0-127.137 https://bugs.launchpad.net/kernel-sru-workflow/+bug/2086357/comments/6 Also Reported separate bug for the issue https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2091990
-- You received this bug notification because you are a member of Canonical Hardware Certification, which is a bug assignee. https://bugs.launchpad.net/bugs/2090163 Title: jammy/linux: 5.15.0-128.138 -proposed tracker Status in canonical-signing-jobs task00 series: Fix Released Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow abi-testing series: Fix Released Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow boot-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow kernel-signoff series: Fix Released Status in Kernel SRU Workflow new-review series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-generate series: Fix Released Status in Kernel SRU Workflow prepare-package-lrg series: Fix Released Status in Kernel SRU Workflow prepare-package-lrm series: Fix Released Status in Kernel SRU Workflow prepare-package-lrs series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Confirmed Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow sru-review series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux source package in Jammy: Fix Released Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- built: from: f19e260182da9ba9 route-entry: 2 comments: abi-testing: 1 delta: promote-to-proposed: [] promote-to-security: [lrm, lrs, main, meta, signed] promote-to-updates: [lrm, lrs, main, meta, signed] flag: boot-testing-requested: true bugs-spammed: true proposed-announcement-sent: true proposed-testing-requested: true stream-from-cycle: true flavours: linux-image-extra-virtual: [amd64, arm64, ppc64el, s390x] linux-image-extra-virtual-hwe-20.04: [amd64, arm64, ppc64el, s390x] linux-image-extra-virtual-hwe-20.04-edge: [amd64, arm64, ppc64el, s390x] linux-image-generic: [amd64, arm64, armhf, ppc64el, s390x] linux-image-generic-64k: [arm64] linux-image-generic-64k-hwe-20.04: [arm64] linux-image-generic-64k-hwe-20.04-edge: [arm64] linux-image-generic-hwe-20.04: [amd64, arm64, armhf, ppc64el, s390x] linux-image-generic-hwe-20.04-edge: [amd64, arm64, armhf, ppc64el, s390x] linux-image-generic-lpae: [armhf] linux-image-generic-lpae-hwe-20.04: [armhf] linux-image-generic-lpae-hwe-20.04-edge: [armhf] linux-image-oem-20.04: [amd64] linux-image-virtual: [amd64, arm64, ppc64el, s390x] linux-image-virtual-hwe-20.04: [amd64, arm64, ppc64el, s390x] linux-image-virtual-hwe-20.04-edge: [amd64, arm64, ppc64el, s390x] issue: KSRU-14844 packages: generate: linux-generate lrg: linux-restricted-generate lrm: linux-restricted-modules lrs: linux-restricted-signatures main: linux meta: linux-meta signed: linux-signed phase: Ready for Promote to Security phase-changed: Wednesday, 18. December 2024 00:17 UTC reason: promote-to-security: Pending -- ready to copy synthetic: :promote-to-as-proposed: Invalid testing: verification-bugs: ['2090163'] trackers: focal/linux-hwe-5.15: bug 2090161 focal/linux-riscv-5.15: bug 2090162 jammy/linux-aws: bug 2090107 jammy/linux-azure: bug 2090113 jammy/linux-bluefield: bug 2090114 jammy/linux-capilano: bug 2090117 jammy/linux-fips: bug 2090120 jammy/linux-gcp: bug 2090124 jammy/linux-gke: bug 2090125 jammy/linux-gkeop: bug 2090126 jammy/linux-ibm: bug 2090128 jammy/linux-ibm-gt: bug 2090131 jammy/linux-intel-iotg: bug 2090145 jammy/linux-kvm: bug 2090146 jammy/linux-lowlatency: bug 2090148 jammy/linux-nvidia: bug 2090150 jammy/linux-oracle: bug 2090152 jammy/linux-raspi: bug 2090154 jammy/linux-realtime: bug 2090136 jammy/linux-uc22: bug 2090157 jammy/linux-xilinx-zynqmp: bug 2090159 variant: debs versions: lrm: 5.15.0-128.138+1 main: 5.15.0-128.138 meta: 5.15.0.128.127 signed: 5.15.0-128.138 versions-replace: lrm: [5.15.0-128.138] ~~: announce: swm-transition-crankable: 2024-11-29 18:14:29.981678 clamps: new-review: f19e260182da9ba9 promote-to-proposed: f19e260182da9ba9 self: 5.15.0-128.138 sru-review: f19e260182da9ba9 tracker: last-message: '2024-12-17 21:24:36.050212+00:00' To manage notifications about this bug go to: https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2090163/+subscriptions -- Mailing list: https://launchpad.net/~canonical-hw-cert Post to : [email protected] Unsubscribe : https://launchpad.net/~canonical-hw-cert More help : https://help.launchpad.net/ListHelp

