No RT issues
** Changed in: kernel-sru-workflow/regression-testing
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
No new RT issues
** Changed in: kernel-sru-workflow/regression-testing
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
The intention of upstream's fix appears to want to rely on $PATH for
running zpool and zfs, however as mentioned in comment #20, the test
after the setting needs a full path:
my $pathto_zpool = $ENV{'pathto_zpool'} || '/usr/sbin/zpool';
...
if (!-x $pathto_zpool) {
# Doesn't support ZFS
This bug was fixed in the package sosreport - 4.1-1ubuntu0.18.04.1
---
sosreport (4.1-1ubuntu0.18.04.1) bionic; urgency=medium
* New 4.1 upstream minor release. (LP: #1917894)
- https://github.com/sosreport/sos/releases/tag/4.1
* d/tests/*:
- Remove obsolete scripts
*
This bug was fixed in the package sosreport - 4.1-1ubuntu0.20.04.1
---
sosreport (4.1-1ubuntu0.20.04.1) focal; urgency=medium
* New 4.1 upstream minor release. (LP: #1917894)
- https://github.com/sosreport/sos/releases/tag/4.1
* d/tests/simple.sh:
- Update the script
This bug was fixed in the package sosreport - 4.1-1ubuntu0.20.10.1
---
sosreport (4.1-1ubuntu0.20.10.1) groovy; urgency=medium
* New 4.1 upstream minor release. (LP: #1917894)
- https://github.com/sosreport/sos/releases/tag/4.1
* d/tests/simple.sh:
- Update the script
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Tags removed: kernel-release-tracking-bug-live
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Tags removed: kernel-release-tracking-bug-live
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको
This bug was fixed in the package grub2 - 2.04-1ubuntu35.6
---
grub2 (2.04-1ubuntu35.6) groovy; urgency=medium
[ Dimitri John Ledkov & Steve Langasek ]
* Relax dependencies to allow grub-efi be installed with later versions
of grub-efi-amd64. Stop building
This bug was fixed in the package grub2-signed - 1.167
---
grub2-signed (1.167) hirsute; urgency=medium
* grub-efi-amd64-signed: add depends on grub2-common with support for
R_X86_64_PLT32 relocations. LP: #1920008
-- Dimitri John Ledkov Thu, 18 Mar 2021 11:17:14
+
**
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
This bug was fixed in the package linux-oracle - 4.15.0-1069.77~16.04.1
---
linux-oracle (4.15.0-1069.77~16.04.1) xenial; urgency=medium
* xenial/linux-oracle: 4.15.0-1069.77~16.04.1 -proposed tracker (LP:
#1919528)
* Bionic update: upstream stable patchset 2021-02-26 (LP:
*** This bug is a duplicate of bug 1922064 ***
https://bugs.launchpad.net/bugs/1922064
This bug was fixed in the package linux-raspi2 - 4.4.0-1150.161
---
linux-raspi2 (4.4.0-1150.161) xenial; urgency=medium
* xenial/linux-raspi2: 4.4.0-1150.161 -proposed tracker (LP:
*** This bug is a duplicate of bug 1922066 ***
https://bugs.launchpad.net/bugs/1922066
This bug was fixed in the package linux-snapdragon - 4.4.0-1154.164
---
linux-snapdragon (4.4.0-1154.164) xenial; urgency=medium
* xenial/linux-snapdragon: 4.4.0-1154.164 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
This bug was fixed in the package linux-raspi2 - 4.4.0-1150.161
---
linux-raspi2 (4.4.0-1150.161) xenial; urgency=medium
* xenial/linux-raspi2: 4.4.0-1150.161 -proposed tracker (LP: #1922064)
[ Ubuntu: 4.4.0-208.240 ]
* xenial/linux: 4.4.0-208.240 -proposed tracker (LP:
This bug was fixed in the package linux-snapdragon - 4.4.0-1154.164
---
linux-snapdragon (4.4.0-1154.164) xenial; urgency=medium
* xenial/linux-snapdragon: 4.4.0-1154.164 -proposed tracker (LP:
#1922066)
[ Ubuntu: 4.4.0-208.240 ]
* xenial/linux: 4.4.0-208.240 -proposed
This bug was fixed in the package linux - 4.4.0-208.240
---
linux (4.4.0-208.240) xenial; urgency=medium
* xenial/linux: 4.4.0-208.240 -proposed tracker (LP: #1922069)
* linux ADT test failure with linux/4.4.0-207.239 -
ubuntu_qrt_kernel_security.test-kernel-security.py (LP:
This bug was fixed in the package linux - 4.4.0-208.240
---
linux (4.4.0-208.240) xenial; urgency=medium
* xenial/linux: 4.4.0-208.240 -proposed tracker (LP: #1922069)
* linux ADT test failure with linux/4.4.0-207.239 -
ubuntu_qrt_kernel_security.test-kernel-security.py (LP:
This bug was fixed in the package linux - 4.4.0-208.240
---
linux (4.4.0-208.240) xenial; urgency=medium
* xenial/linux: 4.4.0-208.240 -proposed tracker (LP: #1922069)
* linux ADT test failure with linux/4.4.0-207.239 -
ubuntu_qrt_kernel_security.test-kernel-security.py (LP:
Will do, thanks for the response.
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
This bug was fixed in the package linux - 4.4.0-208.240
---
linux (4.4.0-208.240) xenial; urgency=medium
* xenial/linux: 4.4.0-208.240 -proposed tracker (LP: #1922069)
* linux ADT test failure with linux/4.4.0-207.239 -
ubuntu_qrt_kernel_security.test-kernel-security.py (LP:
This bug was fixed in the package linux - 4.4.0-208.240
---
linux (4.4.0-208.240) xenial; urgency=medium
* xenial/linux: 4.4.0-208.240 -proposed tracker (LP: #1922069)
* linux ADT test failure with linux/4.4.0-207.239 -
ubuntu_qrt_kernel_security.test-kernel-security.py (LP:
This bug was fixed in the package linux - 4.4.0-208.240
---
linux (4.4.0-208.240) xenial; urgency=medium
* xenial/linux: 4.4.0-208.240 -proposed tracker (LP: #1922069)
* linux ADT test failure with linux/4.4.0-207.239 -
ubuntu_qrt_kernel_security.test-kernel-security.py (LP:
*** This bug is a duplicate of bug 1922069 ***
https://bugs.launchpad.net/bugs/1922069
This bug was fixed in the package linux - 4.4.0-208.240
---
linux (4.4.0-208.240) xenial; urgency=medium
* xenial/linux: 4.4.0-208.240 -proposed tracker (LP: #1922069)
* linux ADT test
This bug was fixed in the package linux - 4.4.0-208.240
---
linux (4.4.0-208.240) xenial; urgency=medium
* xenial/linux: 4.4.0-208.240 -proposed tracker (LP: #1922069)
* linux ADT test failure with linux/4.4.0-207.239 -
ubuntu_qrt_kernel_security.test-kernel-security.py (LP:
This bug was fixed in the package linux-gcp - 4.15.0-1097.110~16.04.1
---
linux-gcp (4.15.0-1097.110~16.04.1) xenial; urgency=medium
* xenial/linux-gcp: 4.15.0-1097.110~16.04.1 -proposed tracker (LP:
#1919524)
[ Ubuntu: 4.15.0-1097.110 ]
* bionic/linux-gcp-4.15:
This bug was fixed in the package linux-azure - 4.15.0-1112.124~16.04.1
---
linux-azure (4.15.0-1112.124~16.04.1) xenial; urgency=medium
* xenial/linux-azure: 4.15.0-1112.124~16.04.1 -proposed tracker (LP:
#1919516)
[ Ubuntu: 4.15.0-1112.124 ]
* bionic/linux-azure-4.15:
This bug was fixed in the package linux - 4.4.0-208.240
---
linux (4.4.0-208.240) xenial; urgency=medium
* xenial/linux: 4.4.0-208.240 -proposed tracker (LP: #1922069)
* linux ADT test failure with linux/4.4.0-207.239 -
ubuntu_qrt_kernel_security.test-kernel-security.py (LP:
This bug was fixed in the package linux - 4.4.0-208.240
---
linux (4.4.0-208.240) xenial; urgency=medium
* xenial/linux: 4.4.0-208.240 -proposed tracker (LP: #1922069)
* linux ADT test failure with linux/4.4.0-207.239 -
ubuntu_qrt_kernel_security.test-kernel-security.py (LP:
This bug was fixed in the package linux - 4.4.0-208.240
---
linux (4.4.0-208.240) xenial; urgency=medium
* xenial/linux: 4.4.0-208.240 -proposed tracker (LP: #1922069)
* linux ADT test failure with linux/4.4.0-207.239 -
ubuntu_qrt_kernel_security.test-kernel-security.py (LP:
This bug was fixed in the package linux-kvm - 4.4.0-1091.100
---
linux-kvm (4.4.0-1091.100) xenial; urgency=medium
* xenial/linux-kvm: 4.4.0-1091.100 -proposed tracker (LP: #1922062)
* CVE-2017-5967
- kvm: [Config] Dropped CONFIG_TIMER_STATS
* Xenial update: v4.4.257
This bug was fixed in the package linux - 4.4.0-208.240
---
linux (4.4.0-208.240) xenial; urgency=medium
* xenial/linux: 4.4.0-208.240 -proposed tracker (LP: #1922069)
* linux ADT test failure with linux/4.4.0-207.239 -
ubuntu_qrt_kernel_security.test-kernel-security.py (LP:
This bug was fixed in the package linux - 4.4.0-208.240
---
linux (4.4.0-208.240) xenial; urgency=medium
* xenial/linux: 4.4.0-208.240 -proposed tracker (LP: #1922069)
* linux ADT test failure with linux/4.4.0-207.239 -
ubuntu_qrt_kernel_security.test-kernel-security.py (LP:
This bug was fixed in the package linux - 4.15.0-141.145
---
linux (4.15.0-141.145) bionic; urgency=medium
* bionic/linux: 4.15.0-141.145 -proposed tracker (LP: #1919536)
* binary assembly failures with CONFIG_MODVERSIONS present (LP: #1919315)
- [Packaging] quiet (nomially)
This bug was fixed in the package linux-aws - 4.15.0-1098.105
---
linux-aws (4.15.0-1098.105) bionic; urgency=medium
* bionic/linux-aws: 4.15.0-1098.105 -proposed tracker (LP: #1919513)
* Enforce CONFIG_DRM_BOCHS=m (LP: #1916290)
- [Config] aws: Add CONFIG_DRM_BOCHS=m
Regression testing completed successfully, no regressions found.
** Changed in: kernel-sru-workflow/regression-testing
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
Assignee: Canonical Kernel Team (canonical-kernel-team) => Kleber
This bug was fixed in the package linux-aws - 5.8.0-1028.30
---
linux-aws (5.8.0-1028.30) groovy; urgency=medium
* groovy/linux-aws: 5.8.0-1028.30 -proposed tracker (LP: #1921043)
* kernel: Enable CONFIG_BPF_LSM on Ubuntu (LP: #1905975)
- [Config][aws] Enable CONFIG_BPF_LSM
This bug was fixed in the package linux-aws - 5.4.0-1043.45
---
linux-aws (5.4.0-1043.45) focal; urgency=medium
* focal/linux-aws: 5.4.0-1043.45 -proposed tracker (LP: #1923247)
* linux-aws 5.4.0-1042.44 has incorrect DKMS versions (LP: #1923245)
- [Packaging] Fix incorrect
No new issues found in the regression testing.
** Changed in: kernel-sru-workflow/regression-testing
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
Assignee: Canonical Kernel Team (canonical-kernel-team) => Marcelo Cerri
(mhcerri)
--
You
With this patch, the test should pass on gcp-fips now
Manually tested on gcp-fips 4.15.
thanks
https://kernel.ubuntu.com/git/ubuntu/autotest-client-tests.git/commit/?id=d308e04ecd38b6a2de82fe07f2d8488de678c6de
** Changed in: linux-gcp (Ubuntu)
Status: New => Invalid
** Changed in:
This bug was fixed in the package libseccomp - 2.5.1-1ubuntu1~20.04.1
---
libseccomp (2.5.1-1ubuntu1~20.04.1) focal; urgency=medium
* Updated to new upstream 2.5.1 version for updated syscalls support
(LP: #1891810)
- Removed the following patches that are now included in
No blocking issues known.
** Changed in: kernel-sru-workflow/kernel-signoff
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/kernel-signoff
Assignee: Canonical Kernel Team (canonical-kernel-team) => Stefan Bader
(smb)
--
You received this bug notification
50 matches
Mail list logo