-
-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
linux-utils v4.2.6 (r4.2) #3650
Comments
Package for host was built (build log) and uploaded to current-testing repository. |
Package for vm-fc36 was built (build log) and uploaded to current-testing repository. |
Package for vm-fc37 was built (build log) and uploaded to current-testing repository. |
Package for vm-fc38 was built (build log) and uploaded to current-testing repository. |
OpenQA test summaryComplete test suite and dependencies: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.2&build=2023042506-4.2&flavor=update New failures, excluding unstableCompared to: https://openqa.qubes-os.org/tests/overview?distri=qubesos&version=4.2&build=2023021823-4.2&flavor=update
Failed tests13 failures
Fixed failuresCompared to: https://openqa.qubes-os.org/tests/60652#dependencies 8 fixed
Unstable tests
|
Package for vm-archlinux failed to build (build log) ((('linux-utils:vm-archlinux-rolling.x86_64:archlinux: Cannot find PKGBUILD.in.',),)). |
Package for vm-archlinux failed to build (build log) ((('linux-utils:vm-archlinux-rolling.x86_64:archlinux: Cannot find PKGBUILD.in.',),)). |
Package for vm-archlinux failed to build (build log) ((('linux-utils:vm-archlinux-rolling.x86_64:archlinux: Cannot find PKGBUILD.in.',),)). |
Superseded by #3682 |
Update of linux-utils to v4.2.6 for Qubes OS r4.2, see comments below for details and build status.
From commit: QubesOS/qubes-linux-utils@8af10c2
Changes since previous version:
QubesOS/qubes-linux-utils@8af10c2 version 4.2.6
QubesOS/qubes-linux-utils@d360a3d Write /dev/loopN to physical-device-path
QubesOS/qubes-linux-utils@e84bb22 Respond to suggestions from code review
QubesOS/qubes-linux-utils@94066d9 Always write "diskseq" entry
QubesOS/qubes-linux-utils@c25e4ed Avoid setting a size limit for the loop device
QubesOS/qubes-linux-utils@eb91a1d Add some static assertions
QubesOS/qubes-linux-utils@1694d8d deduplicate loop opening code
QubesOS/qubes-linux-utils@2d0088a Serialize loop device opening
QubesOS/qubes-linux-utils@98f06b4 Work around bug in LOOP_CTL_GET_FREE
QubesOS/qubes-linux-utils@3131d57 Clean up some error checks
QubesOS/qubes-linux-utils@edc7b41 Retry LOOP_CONFIGURE as well as open
QubesOS/qubes-linux-utils@cd10495 Always use permissive mode
QubesOS/qubes-linux-utils@e34df81 Use different physical-device format for autoclear-enabled kernels
QubesOS/qubes-linux-utils@6fe621a Use "opened" Xenstore key instead of magic file in /etc
QubesOS/qubes-linux-utils@1808a5f Use new "opened" Xenstore key to indicate device open
QubesOS/qubes-linux-utils@da47343 Allow xenstore watch
QubesOS/qubes-linux-utils@3a9a25f Working block script
QubesOS/qubes-linux-utils@8fb76c6 Do not rely on autoclear
QubesOS/qubes-linux-utils@e9c921e Actually open files to be written for writing :)
QubesOS/qubes-linux-utils@581fbc2 more logs
QubesOS/qubes-linux-utils@b67f578 more logs
QubesOS/qubes-linux-utils@01ca72f test
QubesOS/qubes-linux-utils@55b1ea3 C block script implementation
QubesOS/qubes-linux-utils@78a0180 Link testsuite to ICU
QubesOS/qubes-linux-utils@4e5ad00 fix signs
QubesOS/qubes-linux-utils@b6e9fe7 Use uint8_t* with U8_APPEND macros
QubesOS/qubes-linux-utils@b7de85e Generate allowlist at compile-time
QubesOS/qubes-linux-utils@f7e4524 Add some tests
QubesOS/qubes-linux-utils@f015a8e Fix CentOS 8 build
QubesOS/qubes-linux-utils@b7b4461 Create libqubes-pure: a library of Qubes-specific code that does no I/O
QubesOS/qubes-linux-utils@b177446 Only allow scripts recommended for identifiers
QubesOS/qubes-linux-utils@185fc58 Do not allow non-ASCII symbols in filenames
QubesOS/qubes-linux-utils@cc746b8 Only allow a subset of scripts
QubesOS/qubes-linux-utils@828c509 Reject bidirectional text
QubesOS/qubes-linux-utils@e685bf3 Add fast path for ASCII
QubesOS/qubes-linux-utils@0fbab24 Misc cleanup
QubesOS/qubes-linux-utils@0287c18 Reject all unassigned and invalid Unicode codepoints
QubesOS/qubes-linux-utils@911dfdd Simplify loop
QubesOS/qubes-linux-utils@9270d80 Drop a call to strlen()
QubesOS/qubes-linux-utils@45b844a Remove redundant code in pathname handling
QubesOS/qubes-linux-utils@de71f77 Forbid trailing slashes in paths
QubesOS/qubes-linux-utils@a1cdd44 Avoid unit testing strchr()
QubesOS/qubes-linux-utils@3b7f159 Avoid closing AT_FDCWD
QubesOS/qubes-linux-utils@53f691b Avoid using a mutable static variable
QubesOS/qubes-linux-utils@bb1e735 Rename open_safe to opendir_safe and document it
QubesOS/qubes-linux-utils@def2672 gentlb.py: Flush stdout before exiting
QubesOS/qubes-linux-utils@f3906b1 Use "surrogates" instead of "category Cs"
QubesOS/qubes-linux-utils@039273c Handle too-large code points in generated code
QubesOS/qubes-linux-utils@f6e93a8 Use GCC case ranges more
QubesOS/qubes-linux-utils@b566640 Clarify differences between code and RFC3629
QubesOS/qubes-linux-utils@c0fddfa Make code_point computations consistent
QubesOS/qubes-linux-utils@da18bd6 Do not allow UTIME_OMIT and UTIME_NOW
QubesOS/qubes-linux-utils@ddf04b9 Use simpler check to allow spaces in file names
QubesOS/qubes-linux-utils@13389b5 Remove useless check
QubesOS/qubes-linux-utils@ed68c01 Use FD-based versions chmod and utime
QubesOS/qubes-linux-utils@ba28e0f Use a generated blocklist
QubesOS/qubes-linux-utils@82887e9 Simplify rejection of invalid codepoints
QubesOS/qubes-linux-utils@36321a7 Add a blocklist of bad characters
QubesOS/qubes-linux-utils@372fcab Allow UTF-8 characters outside of ASCII
QubesOS/qubes-linux-utils@ce2df91 Initial work on safe open
QubesOS/qubes-linux-utils@136bacb Sanitize paths in qfile-unpacker
Referenced issues:
If you're release manager, you can issue GPG-inline signed command:
Upload-component r4.2 linux-utils 8af10c2680f1dd4c67ad12bafda47f2720015fc2 current all
(available 5 days from now)Upload-component r4.2 linux-utils 8af10c2680f1dd4c67ad12bafda47f2720015fc2 security-testing
You can choose subset of distributions like:
Upload-component r4.2 linux-utils 8af10c2680f1dd4c67ad12bafda47f2720015fc2 current vm-bookworm,vm-fc37
(available 5 days from now)Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
For more information on how to test this update, please take a look at https://www.qubes-os.org/doc/testing/#updates.
The text was updated successfully, but these errors were encountered: