amd64/kvm canonical-certs.pem unchanged
amd64/kvm canonical-revoked-certs.pem unchanged
amd64/kvm fwinfo unchanged
amd64/kvm modules differs
  @@ -12,6 +12,7 @@
   adfs
   aead
   aes_generic
  +af_alg (ok)
   af_key
   af_packet
   affs
  @@ -20,6 +21,7 @@
   ahci
   ahci_platform
   akcipher
  +algif_hash (ok)
   amd-rng
   amd-uncore
   amd_pstate
  @@ -61,6 +63,8 @@
   cifs
   cifs_arc4
   cifs_md4
  +cls_bpf (ok)
  +cls_cgroup (ok)
   cmac
   cn
   coda
  @@ -533,9 +537,11 @@
   sata_uli
   sata_via
   sata_vsc
  +sch_ingress (ok)
   scsi_common
   scsi_mod
   scsi_transport_iscsi
  +scsi_transport_sas (ok)
   sd_mod
   seco-cec
   seqiv
amd64/kvm retpoline unchanged

** Changed in: kernel-sru-workflow/abi-testing
       Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of hardware-
certification-users, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2078140

Title:
  jammy/linux-kvm: 5.15.0-1067.72 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow abi-testing series:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow boot-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow new-review series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-generate series:
  Fix Committed
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Committed
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Committed
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow sru-review series:
  Confirmed
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-kvm source package in Jammy:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
    https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  built:
    from: 34be0bec9ecea695
    route-entry: 2
  comments:
    abi-testing: 1
  delta:
    promote-to-proposed: [main, meta, signed, generate]
  flag:
    stream-from-cycle: true
  issue: KSRU-13821
  kernel-stable-master-bug: 2078154
  packages:
    generate: linux-generate-kvm
    main: linux-kvm
    meta: linux-meta-kvm
    signed: linux-signed-kvm
  phase: Packaging
  phase-changed: Friday, 30. August 2024 13:47 UTC
  reason:
    :prepare-packages: Pending -- building in ppa (generate:Q signed:D
      meta:Q)
    new-review: Pending -s ready for review
    prepare-package-generate: Ongoing -- generate package not yet fully
      built
    prepare-package-meta: Ongoing -- meta package not yet fully built
    prepare-package-signed: Ongoing -- signed package not yet fully
      built
    sru-review: Pending -s ready for review
  synthetic:
    :promote-to-as-proposed: Invalid
  variant: debs
  versions:
    main: 5.15.0-1067.72
    meta: 5.15.0.1067.63
    signed: 5.15.0-1067.72
  ~~:
    announce:
      swm-transition-crankable: 2024-08-30 09:12:58.836520
    clamps:
      new-review: 34be0bec9ecea695
      self: 5.15.0-1067.72
      sru-review: 34be0bec9ecea695
    tracker:
      last-message: '2024-08-30 15:00:08.490162+00:00'

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/2078140/+subscriptions


-- 
Mailing list: https://launchpad.net/~canonical-hw-cert
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~canonical-hw-cert
More help   : https://help.launchpad.net/ListHelp

Reply via email to