← Back to team overview

group.of.nepali.translators team mailing list archive

[Bug 1727343] Re: rt-tests 0.93-1ubuntu1 ADT test failure with linux-hwe-edge 4.13.0-16.19~16.04.3

 

This bug was fixed in the package rt-tests - 0.93-1ubuntu2

---------------
rt-tests (0.93-1ubuntu2) xenial; urgency=medium

  * Add support to backfire for 4.11 kernels. (LP: #1727343)
    - debian/patches/backfire-fix-build-failure-for-4.11-kernels.patch

 -- Marcelo Henrique Cerri <marcelo.cerri@xxxxxxxxxxxxx>  Wed, 01 Nov
2017 14:50:01 -0200

** Changed in: rt-tests (Ubuntu Xenial)
       Status: Incomplete => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1727343

Title:
  rt-tests 0.93-1ubuntu1 ADT test failure with linux-hwe-edge
  4.13.0-16.19~16.04.3

Status in rt-tests package in Ubuntu:
  In Progress
Status in rt-tests source package in Xenial:
  Fix Released

Bug description:
  [Impact]

  Currently the DKMS package fails to install in supported custom
  kernels that are based on 4.11 or 4.13. That includes the current 4.11
  hwe-edge and the upcoming 4.13 hwe-edge kernels and some of the custom
  and cloud kernels as well.

  [Test Case]

  Install the DKMS package with the 4.13 hwe-edge kernel from -proposed.
  The package installation should proceed without any errors.

  [Regression Potential]

  Although new patches were added, the regression risk is very low since
  the new changes are conditionally compiled based on the kernel
  version.

  Besides that the new package was tested with the following kernels in
  an amd64 environment:

  - linux-generic 4.4
  - linux-hwe 4.10
  - linux-hwe-edge 4.11
  - linux-hwe-edge 4.13 (from xenial-proposed)
  - linux-azure 4.11
  - linux-azure-edge 4.13 (which is in process of getting promoted to
    xenial-proposed)

  [Original description]

  Testing failed on:
      amd64: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/amd64/r/rt-tests/20171018_120348_f6c62@/log.gz
      armhf: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/armhf/r/rt-tests/20171018_120711_f6c62@/log.gz
      i386: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/i386/r/rt-tests/20171018_121506_f6c62@/log.gz
      ppc64el: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/ppc64el/r/rt-tests/20171018_121632_f6c62@/log.gz
      s390x: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/s390x/r/rt-tests/20171018_120217_f6c62@/log.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rt-tests/+bug/1727343/+subscriptions