Building in security only bileto ppa

$ dput ppa:ci-train-ppa-service/4601 
oss4_4.2-build2010-5ubuntu6~20.04.3_source.changes
D: Splitting host argument out of  ppa:ci-train-ppa-service/4601.
D: Setting host argument.
Checking signature on .changes
gpg: /tmp/oss4_4.2-build2010-5ubuntu6~20.04.3_source.changes: Valid signature 
from 9B8EC849D5EF70ED
Checking signature on .dsc
gpg: /tmp/oss4_4.2-build2010-5ubuntu6~20.04.3.dsc: Valid signature from 
9B8EC849D5EF70ED
Uploading to ppa (via sftp to ppa.launchpad.net):
  Uploading oss4_4.2-build2010-5ubuntu6~20.04.3.dsc: done.
  Uploading oss4_4.2-build2010-5ubuntu6~20.04.3.debian.tar.xz: done.  
  Uploading oss4_4.2-build2010-5ubuntu6~20.04.3_source.buildinfo: done.  
  Uploading oss4_4.2-build2010-5ubuntu6~20.04.3_source.changes: done.
Successfully uploaded packages.


** Description changed:

  [Impact]
  oss4 dkms will fail to build on 5.11 kernels on focal, preventing users from 
using those modules on more recent kernels.
  
  [Test case]
  Install the package and make sure it builds.
  
  [Fix]
  Conditionally define a function that is not used on the Linux port when 
LICENSED_VERSION is undefined.
  
  [Fix risk]
  Licensed versions will fail to build, but we don't do those. Other ports 
should not fail as we only patch the Linux port.
  
  [Potential regression]
  The dkms package may still fail to build, install or load. Or sound might not 
work on systems that depend on oss4.
  
  ---------------------------------------------------------------
  This is a scripted bug report about ADT failures while running oss4 tests for 
linux-hwe-5.11/5.11.0-20.21~20.04.1 on focal. Whether this is caused by the 
dep8 tests of the tested source or the kernel has yet to be determined.
  
  Testing failed on:
      amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-focal/focal/amd64/o/oss4/20210611_210018_1dcc5@/log.gz
+ 
+ [Other]
+ 
+ NB! dkms ftbfs fixes must be built in security, such that after SRU
+ process in -proposed & -updates it can be copied into -security pocket
+ too.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-hwe-5.11 in Ubuntu.
https://bugs.launchpad.net/bugs/1932168

Title:
  oss4/4.2-build2010-5ubuntu6~20.04.2 ADT test failure with linux-
  hwe-5.11/5.11.0-20.21~20.04.1

Status in linux-hwe-5.11 package in Ubuntu:
  New
Status in oss4 package in Ubuntu:
  New
Status in linux-hwe-5.11 source package in Focal:
  New
Status in oss4 source package in Focal:
  In Progress

Bug description:
  [Impact]
  oss4 dkms will fail to build on 5.11 kernels on focal, preventing users from 
using those modules on more recent kernels.

  [Test case]
  Install the package and make sure it builds.

  [Fix]
  Conditionally define a function that is not used on the Linux port when 
LICENSED_VERSION is undefined.

  [Fix risk]
  Licensed versions will fail to build, but we don't do those. Other ports 
should not fail as we only patch the Linux port.

  [Potential regression]
  The dkms package may still fail to build, install or load. Or sound might not 
work on systems that depend on oss4.

  ---------------------------------------------------------------
  This is a scripted bug report about ADT failures while running oss4 tests for 
linux-hwe-5.11/5.11.0-20.21~20.04.1 on focal. Whether this is caused by the 
dep8 tests of the tested source or the kernel has yet to be determined.

  Testing failed on:
      amd64: 
https://autopkgtest.ubuntu.com/results/autopkgtest-focal/focal/amd64/o/oss4/20210611_210018_1dcc5@/log.gz

  [Other]

  NB! dkms ftbfs fixes must be built in security, such that after SRU
  process in -proposed & -updates it can be copied into -security pocket
  too.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-hwe-5.11/+bug/1932168/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to