v4l2loopback 0.9.1-4 ADT test failure with linux-hwe-edge 4.15.0-23.25~16.04.1

Bug #1777913 reported by Marcelo Cerri
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
v4l2loopback (Ubuntu)
Invalid
Undecided
Marcelo Cerri
Xenial
Fix Released
Undecided
Marcelo Cerri

Bug Description

[Impact]

Currently the DKMS package fails to install on supported custom
kernels that are based on 4.15. That includes the current 4.15
hwe-edge and some of the custom and cloud kernels as well.

[Test Case]

Install the v4l2loopback-dkms package with the 4.15 hwe-edge kernel. The
package installation should proceed without any errors.

[Regression Potential]

Although new patches were added, the regression risk is very low since
the new changes are conditionally compiled based on the kernel
version.

Besides that, the new package was tested with the following kernels in
an amd64 environment:

- linux-generic 4.4
- linux-hwe 4.13
- linux-hwe-edge 4.15
- linux-azure 4.15

[Original Description]

Testing failed on:
    amd64: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/amd64/v/v4l2loopback/20180528_193715_17347@/log.gz
    arm64: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/arm64/v/v4l2loopback/20180528_195418_17347@/log.gz
    armhf: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/armhf/v/v4l2loopback/20180528_194438_17347@/log.gz
    i386: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/i386/v/v4l2loopback/20180528_194448_17347@/log.gz
    ppc64el: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/ppc64el/v/v4l2loopback/20180528_194859_17347@/log.gz
    s390x: https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/s390x/v/v4l2loopback/20180528_193931_17347@/log.gz

Revision history for this message
Marcelo Cerri (mhcerri) wrote :
tags: added: kernel-adt-failure
Changed in v4l2loopback (Ubuntu):
status: New → In Progress
assignee: nobody → Marcelo Cerri (mhcerri)
description: updated
Revision history for this message
Marcelo Cerri (mhcerri) wrote :
tags: added: patch
Tyler Hicks (tyhicks)
description: updated
Changed in v4l2loopback (Ubuntu):
status: In Progress → Invalid
Changed in v4l2loopback (Ubuntu Xenial):
status: New → In Progress
assignee: nobody → Marcelo Cerri (mhcerri)
Revision history for this message
Tyler Hicks (tyhicks) wrote :

This debdiff looked mostly good. The version string wasn't quite typical of what we use for updates to stable releases. I'd prefer that you follow these guidelines when updating a package that hasn't already been through an SRU (you'll mostly likely have to follow the versioning scheme of the previous uploader if it has already been through at least one SRU):

  https://wiki.ubuntu.com/SecurityTeam/UpdatePreparation#Update_the_packaging

I've adjusted the version to be 0.9.1-4ubuntu0.1 and sponsored the upload to xenial-proposed. Thanks!

Revision history for this message
Łukasz Zemczak (sil2100) wrote : Please test proposed package

Hello Marcelo, or anyone else affected,

Accepted v4l2loopback into xenial-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/v4l2loopback/0.9.1-4ubuntu0.1 in a few hours, and then in the -proposed repository.

Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how to enable and use -proposed.Your feedback will aid us getting this update out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested and change the tag from verification-needed-xenial to verification-done-xenial. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification-failed-xenial. In either case, without details of your testing we will not be able to proceed.

Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance!

Changed in v4l2loopback (Ubuntu Xenial):
status: In Progress → Fix Committed
tags: added: verification-needed verification-needed-xenial
Revision history for this message
Marcelo Cerri (mhcerri) wrote :

I have tested the version 0.9.1-4ubuntu0.1 and the DKMS package successfully builds and loads on kernels 4.15, which was the issue reported in this bug.

I also have run the ADT tests for the following kernels to ensure there's no regressions:

- linux-generic 4.4
- linux-hwe 4.15
- linux-azure-edge 4.15

tags: added: verification-done verification-done-xenial
removed: verification-needed verification-needed-xenial
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package v4l2loopback - 0.9.1-4ubuntu0.1

---------------
v4l2loopback (0.9.1-4ubuntu0.1) xenial; urgency=medium

  * Add support for Linux kernel 4.15 (LP: #1777913):
    - debian/patches/adapt-to-new-kernel-timer-api.patch

 -- Marcelo Henrique Cerri <email address hidden> Wed, 20 Jun 2018 15:31:36 -0300

Changed in v4l2loopback (Ubuntu Xenial):
status: Fix Committed → Fix Released
Revision history for this message
Łukasz Zemczak (sil2100) wrote : Update Released

The verification of the Stable Release Update for v4l2loopback has completed successfully and the package has now been released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regressions.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Bug attachments

Remote bug watches

Bug watches keep track of this bug in other bug trackers.