> 9. apply systemtap fixes
> see BZ - https://bugzilla.linux.ibm.com/show_bug.cgi?id=131220

Please test with the actual systemtap package from trusty-proposed
(2.3-1ubuntu1.3), instead of manually patching the source.

> make check

This is not being run at build time because it is too intrusive on the
build environment, as described at <https://bugs.debian.org/cgi-
bin/bugreport.cgi?bug=526957>.  But it should have been part of the
autopkgtests for this package, and those autopkgtests should be run for
each new kernel.  ("Should", but is not the case today.)

Please note that systemtap is not supported by Canonical except as the
systemtap-sdt-dev package which is used as a build-dependency for
various other supported packages.  While it would be acceptable per the
Ubuntu archive policy to include a new upstream version of systemtap
into trusty-updates, the regression testing for such an update must
include tests of the reverse-dependencies (ust and php5).

So we intend to decline this SRU for the 14.04.4 release.  I have also
marked bug #1511347 "verification-failed" based on the results of this
testing with the 14.04.4 kernel.  If IBM believes it useful to proceed
with that previous SRU of systemtap, so that it's enabled for
compatibility with systems running the (Canonical-supported) 14.04.3
kernel, we can reverse that and still release the SRU.

** Bug watch added: bugzilla.linux.ibm.com/ #131220
   https://bugzilla.linux.ibm.com/show_bug.cgi?id=131220

** Bug watch added: Debian Bug tracker #526957
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526957

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1537125

Title:
  ubuntu-14.04.04: fail to run systemtap test suites

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemtap/+bug/1537125/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to