[Bug 2095138] [NEW] Failed to build against linux-generic 6.8 and 6.11 with stable backports:

Launchpad Bug Tracker 2095138 at bugs.launchpad.net
Wed Feb 26 20:33:22 UTC 2025


You have been subscribed to a public bug by Ubuntu Foundations Team Bug Bot (crichton):

We bump into a few problems when dealing with ABI/API breakages due to
stable fixes backports:

1. KERNEL_VERSON has limits for the 3 numbers. They must be under 255 or
saturated to 255. While stable updates can go way beyong, e.g. v4.4.302,
v4.9.337, v4.14.336, v4.19.325, v5.4.288, the next one going break the
ceiling soon is v5.10.232, and v5.15.175 is on the way, too. We cannot
use KERNEL_VERSON to detect ABI/API changes in such cases.

2. Ubuntu kernels may backport those stable fixes out of the original
order, meaning the applied version may differ between
mainline/generic/derived kernels.

3. generic-6.8 is tracking v6.6.y and v6.10.y, and the KERNEL_VERSION
will stay 6.8.12(?) forever, becase we simply cannot change it to 6.6.x
nor 6.10.x.

In these situations, we need some kind of build time detection, and zfs
already has such mechanism.

This is a follow-up for bug 2089385.

** Affects: backport-iwlwifi-dkms (Ubuntu)
     Importance: High
     Assignee: You-Sheng Yang (vicamo)
         Status: In Progress

** Affects: backport-iwlwifi-dkms (Ubuntu Jammy)
     Importance: High
     Assignee: You-Sheng Yang (vicamo)
         Status: In Progress

** Affects: backport-iwlwifi-dkms (Ubuntu Noble)
     Importance: High
     Assignee: You-Sheng Yang (vicamo)
         Status: In Progress

** Affects: backport-iwlwifi-dkms (Ubuntu Oracular)
     Importance: High
     Assignee: You-Sheng Yang (vicamo)
         Status: In Progress

** Affects: backport-iwlwifi-dkms (Ubuntu Plucky)
     Importance: High
     Assignee: You-Sheng Yang (vicamo)
         Status: In Progress


** Tags: patch
-- 
Failed to build against linux-generic 6.8 and 6.11 with stable backports:
https://bugs.launchpad.net/bugs/2095138
You received this bug notification because you are a member of Ubuntu Sponsors, which is subscribed to the bug report.



More information about the Ubuntu-sponsors mailing list