пятница

[Bug 2142235] Re: linux-riscv-6.8 is FTBFS because of missing patches

This bug was fixed in the package linux-riscv-6.8 -
6.8.0-106.106~22.04.1

---------------
linux-riscv-6.8 (6.8.0-106.106~22.04.1) jammy; urgency=medium

[ Ubuntu: 6.8.0-106.106 ]

* Miscellaneous upstream changes
- apparmor: validate DFA start states are in bounds in unpack_pdb
- apparmor: fix memory leak in verify_header
- apparmor: replace recursive profile removal with iterative approach
- apparmor: fix: limit the number of levels of policy namespaces
- apparmor: fix side-effect bug in match_char() macro usage
- apparmor: fix missing bounds check on DEFAULT table in verify_dfa()
- apparmor: Fix double free of ns_name in aa_replace_profiles()
- apparmor: fix unprivileged local user can do privileged policy
management
- apparmor: fix differential encoding verification
- apparmor: fix race on rawdata dereference
- apparmor: fix race between freeing data and fs accessing it

-- Mehmet Basaran <mehmet.basaran@canonical.com> Mon, 09 Mar 2026
18:37:36 +0300

** Changed in: linux-riscv-6.8 (Ubuntu Jammy)
Status: Fix Committed => Fix Released

--
You received this bug notification because you are subscribed to linux
in Ubuntu.
Matching subscriptions: Bgg, Bmail, Nb
https://bugs.launchpad.net/bugs/2142235

Title:
linux-riscv-6.8 is FTBFS because of missing patches

Status in linux package in Ubuntu:
Invalid
Status in linux-riscv-6.8 package in Ubuntu:
Fix Committed
Status in linux source package in Jammy:
Invalid
Status in linux-riscv-6.8 source package in Jammy:
Fix Released
Status in linux source package in Noble:
Fix Committed
Status in linux-riscv-6.8 source package in Noble:
Invalid

Bug description:
[ Impact ]

Previously applied patches to the generic kernel are making
jammy:linux-riscv-6.8 FTBFS because of missing declaration of some
functions in arch/riscv/net/bpf_jit.h.

Those previous patches were applied in bulk as part of upstream stable patchset 2026-01-26.
See https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2139072

The following commit, fixing CVE-2025-40079, from kernel 6.12, uses functions that were not yet defined in 6.8:
 riscv, bpf: Sign extend struct ops return values properly (fd2e08128944a7679e753f920e9eda72057e427c)

Error log:
/build/jammy/arch/riscv/net/bpf_jit_comp64.c:582:17: error: implicit declaration of function 'emit_sextb'; did you mean 'emit_sub'? [-Werror=implicit-function-declaration]
/build/jammy/arch/riscv/net/bpf_jit_comp64.c:585:17: error: implicit declaration of function 'emit_sexth'; did you mean 'emit_zext_32'? [-Werror=implicit-function-declaration]
/build/jammy/arch/riscv/net/bpf_jit_comp64.c:588:17: error: implicit declaration of function 'emit_sextw'; did you mean 'emit_subw'? [-Werror=implicit-function-declaration]
... and more missing functions

[ Fix ]

Cherry picked 6 missing commits from upstream:
- e33758f7493c9ad8cf6960bcf7c70f5761f3acfb "riscv, bpf: Unify 32-bit sign-extension to emit_sextw"
- 914c7a5ff18a225f7df254ae3433574f3d47b711 "riscv, bpf: Unify 32-bit zero-extension to emit_zextw"
- - 361db44c3c59cde05e9926647f16255e274a37f4 "riscv, bpf: Simplify sext and zext logics in branch instructions"
- 647b93f65daa128d9a0e4aac744a5fcf5f58b2d2 "riscv, bpf: Add necessary Zbb instructions"
- 519fb722bea09ae2664ad21f8ef4360fb799eb2f "riscv, bpf: Optimize sign-extention mov insns with Zbb support"
- 06a33d024838414432b6c0f51f994e7f1695b74f "riscv, bpf: Optimize bswap insns with Zbb support"

Those commits add definitions for the missing functions emit_sextX and
others.

[ Test Case ]

Kernel build succeeded.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2142235/+subscriptions

Комментариев нет:

Отправить комментарий