Skip to content

Conversation

CBL-Mariner-Bot
Copy link
Collaborator

[AUTOPATCHER-kernel] Kernel upgrade to version 6.6.101.2 - branch 3.0-dev
Upgrade pipeline run -> https://dev.azure.com/mariner-org/mariner/_build/results?buildId=904212&view=results

buddy build kernel,kernel-headers,hyperv-daemons,kernel,kernel-64k -> https://dev.azure.com/mariner-org/mariner/_build/results?buildId=904233&view=results

buddy build kernel-ipe -> https://dev.azure.com/mariner-org/mariner/_build/results?buildId=904320&view=results

@CBL-Mariner-Bot
Copy link
Collaborator Author

CBL-Mariner-Bot commented Aug 19, 2025

🚨 PR Check Failed - Critical Issues Found

Found 3 critical/error issue(s) that must be fixed.

🔍 Critical Issues Detected:

  1. Missing Patch File (ERROR)
    • Patch file '0001-add-mstflint-kernel-%{mstflintver}.patch' is referenced in the spec but not found in the directory
    • 💡 Fix: Add the missing patch file or update the Patch reference
  2. Missing Patch File (ERROR)
    • Patch file '0001-add-mstflint-kernel-%{mstflintver}.patch' is referenced in the spec but not found in the directory
    • 💡 Fix: Add the missing patch file or update the Patch reference
  3. Missing Patch File (ERROR)
    • Patch file '0001-add-mstflint-kernel-%{mstflintver}.patch' is referenced in the spec but not found in the directory
    • 💡 Fix: Add the missing patch file or update the Patch reference

🤖 AI Analysis Summary:

Brief Analysis: The spec file changes upgrade the kernel version consistently and adjust some configuration options (for example, switching CONFIG_MULTIPLEXER from module to built‐in). The only patch file is the mstflint driver patch, and its file (“0001-add-mstflint-kernel-4.28.0.patch”) is present.

Critical Issues Found: No critical or error‐level security issues were identified. No explicit CVE patches in “CVE-YYYY-XXXXX.patch” format are referenced, so nothing is missing or mis‐named.

Recommended Actions:
• Ensure that any future security patches follow the CVE-YYYY-XXXXX naming pattern and are properly referenced in the spec.
• Verify that autosetup (%autosetup -p1) appropriately applies all patches.
• Expand changelog entries for CVE fixes with clear attribution and upstream reference if such patches are added in subsequent updates.


📋 For detailed analysis and recommendations, check the Azure DevOps pipeline logs.

@rlmenge
Copy link
Contributor

rlmenge commented Sep 23, 2025

Closing in favor of : #14714

@rlmenge rlmenge closed this Sep 23, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
3.0-dev PRs Destined for AzureLinux 3.0 Automatic PR AutoUpgrade Kernel Packaging specs-extended PR to fix SPECS-EXTENDED Tools
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants