← Back to team overview

group.of.nepali.translators team mailing list archive

[Bug 1777913] Re: v4l2loopback 0.9.1-4 ADT test failure with linux-hwe-edge 4.15.0-23.25~16.04.1

 

** Description changed:

  [Impact]
  
  Currently the DKMS package fails to install on supported custom
  kernels that are based on 4.15. That includes the current 4.15
  hwe-edge and some of the custom and cloud kernels as well.
  
  [Test Case]
  
- Install the broadcom-sta package with the 4.15 hwe-edge kernel. The
+ Install the v4l2loopback-dkms package with the 4.15 hwe-edge kernel. The
  package installation should proceed without any errors.
  
  [Regression Potential]
  
  Although new patches were added, the regression risk is very low since
  the new changes are conditionally compiled based on the kernel
  version.
  
  Besides that, the new package was tested with the following kernels in
  an amd64 environment:
  
  - linux-generic 4.4
  - linux-hwe 4.13
  - linux-hwe-edge 4.15
  - linux-azure 4.15
  
  [Original Description]
  
  Testing failed on:
      amd64: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/amd64/v/v4l2loopback/20180528_193715_17347@/log.gz
      arm64: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/arm64/v/v4l2loopback/20180528_195418_17347@/log.gz
      armhf: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/armhf/v/v4l2loopback/20180528_194438_17347@/log.gz
      i386: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/i386/v/v4l2loopback/20180528_194448_17347@/log.gz
      ppc64el: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/ppc64el/v/v4l2loopback/20180528_194859_17347@/log.gz
      s390x: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/s390x/v/v4l2loopback/20180528_193931_17347@/log.gz

** Also affects: v4l2loopback (Ubuntu Xenial)
   Importance: Undecided
       Status: New

** Changed in: v4l2loopback (Ubuntu)
       Status: In Progress => Invalid

** Changed in: v4l2loopback (Ubuntu Xenial)
       Status: New => In Progress

** Changed in: v4l2loopback (Ubuntu Xenial)
     Assignee: (unassigned) => Marcelo Cerri (mhcerri)

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1777913

Title:
  v4l2loopback 0.9.1-4 ADT test failure with linux-hwe-edge
  4.15.0-23.25~16.04.1

Status in v4l2loopback package in Ubuntu:
  Invalid
Status in v4l2loopback source package in Xenial:
  In Progress

Bug description:
  [Impact]

  Currently the DKMS package fails to install on supported custom
  kernels that are based on 4.15. That includes the current 4.15
  hwe-edge and some of the custom and cloud kernels as well.

  [Test Case]

  Install the v4l2loopback-dkms package with the 4.15 hwe-edge kernel. The
  package installation should proceed without any errors.

  [Regression Potential]

  Although new patches were added, the regression risk is very low since
  the new changes are conditionally compiled based on the kernel
  version.

  Besides that, the new package was tested with the following kernels in
  an amd64 environment:

  - linux-generic 4.4
  - linux-hwe 4.13
  - linux-hwe-edge 4.15
  - linux-azure 4.15

  [Original Description]

  Testing failed on:
      amd64: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/amd64/v/v4l2loopback/20180528_193715_17347@/log.gz
      arm64: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/arm64/v/v4l2loopback/20180528_195418_17347@/log.gz
      armhf: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/armhf/v/v4l2loopback/20180528_194438_17347@/log.gz
      i386: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/i386/v/v4l2loopback/20180528_194448_17347@/log.gz
      ppc64el: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/ppc64el/v/v4l2loopback/20180528_194859_17347@/log.gz
      s390x: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/s390x/v/v4l2loopback/20180528_193931_17347@/log.gz

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/v4l2loopback/+bug/1777913/+subscriptions