xenial/linux-snapdragon: 4.4.0-1134.142 -proposed tracker

Bug #1863329 reported by Kleber Sacilotto de Souza on 2020-02-14
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Medium
Unassigned
Automated-testing
Medium
Canonical Kernel Team
Certification-testing
Medium
Canonical Hardware Certification
Prepare-package
Medium
Khaled El Mously
Prepare-package-meta
Medium
Khaled El Mously
Promote-to-proposed
Medium
Andy Whitcroft
Promote-to-security
Medium
Andy Whitcroft
Promote-to-updates
Medium
Andy Whitcroft
Regression-testing
Medium
Canonical Kernel Team
Security-signoff
Medium
Steve Beattie
Verification-testing
Medium
Canonical Kernel Team
linux-snapdragon (Ubuntu)
Undecided
Unassigned
Xenial
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
boot-testing-requested: true
kernel-stable-master-bug: 1865106
packages:
  main: linux-snapdragon
  meta: linux-meta-snapdragon
phase: Complete
phase-changed: Tuesday, 17. March 2020 12:28 UTC
proposed-announcement-sent: true
proposed-testing-requested: true
reason: {}
trackers:
  xenial/linux-snapdragon/dragonboard-kernel: bug 1863326
variant: debs

tags: added: kernel-release-tracking-bug xenial
Changed in linux-snapdragon (Ubuntu Xenial):
status: New → Confirmed
Changed in linux-snapdragon (Ubuntu):
status: New → Invalid
Changed in linux-snapdragon (Ubuntu Xenial):
importance: Undecided → Medium
tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2020.02.17-1
description: updated
tags: added: kernel-sru-derivative-of-1863338
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
summary: - linux-snapdragon: <version to be filled> -proposed tracker
+ xenial/linux-snapdragon: <version to be filled> -proposed tracker
description: updated
description: updated
summary: - xenial/linux-snapdragon: <version to be filled> -proposed tracker
+ xenial/linux-snapdragon: 4.4.0-1134.142 -proposed tracker
description: updated
description: updated
description: updated
tags: added: block-proposed-xenial
tags: added: block-proposed
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
Gavin Lin (gavin.lin) wrote :

Hardware Certification have completed testing this -proposed kernel. No regressions were observed, results are available here:
https://certification.canonical.com/hardware/201611-25221/submission/163061/

description: updated
description: updated
description: updated
description: updated
tags: removed: block-proposed-xenial
tags: removed: block-proposed
description: updated
description: updated
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux-snapdragon - 4.4.0-1134.142

---------------
linux-snapdragon (4.4.0-1134.142) xenial; urgency=medium

  * xenial/linux-snapdragon: 4.4.0-1134.142 -proposed tracker (LP: #1863329)

  [ Ubuntu: 4.4.0-175.205 ]

  * xenial/linux: 4.4.0-175.205 -proposed tracker (LP: #1863338)
  * run_afpackettests in ubuntu_kernel_selftests failed with "./in_netns.sh:
    Permission denied" (LP: #1861973)
    - [Debian] autoreconstruct - add resoration of execute permissions
  * pty03 from pty in ubuntu_ltp failed on Eoan (LP: #1862114)
    - can, slip: Protect tty->disc_data in write_wakeup and close with RCU

 -- Khalid Elmously <email address hidden> Wed, 19 Feb 2020 00:07:59 -0500

Changed in linux-snapdragon (Ubuntu Xenial):
status: Confirmed → Fix Released
description: updated
description: updated
description: updated

All tasks have been completed and the bug is being set to Fix Released

Changed in kernel-sru-workflow:
status: In Progress → Fix Released
Andy Whitcroft (apw) on 2020-05-28
tags: removed: kernel-release-tracking-bug-live
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers