Your message dated Sat, 02 Aug 2014 10:21:19 +0000
with message-id <[email protected]>
and subject line Bug#754206: fixed in keyutils 1.5.9-5
has caused the Debian Bug report #754206,
regarding keyutils: FTBFS on arm64 (test failed)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
754206: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=754206
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: keyutils
Version: 1.5.9-4
Severity: normal
User: [email protected]
Usertag: arm64

Building keyutils on arm64 fails due to a failing test.:
http://buildd.debian-ports.org/status/fetch.php?pkg=keyutils&arch=arm64&ver=1.5.9-4&stamp=1401967181

A test just now gave this in the log
=== 
/home/buildd/packages/modified/keyutils-1.5.9/tests/keyctl/padd/bad-args/test.out
 ===
+++ CHECK EMPTY KEY TYPE
+++ CHECK UNSUPPORTED KEY TYPE
+++ CHECK INVALID KEY TYPE
+++ CHECK MAXLEN KEY TYPE
+++ CHECK OVERLONG KEY TYPE
+++ CHECK ADD KEYRING WITH PAYLOAD
+++ CHECK MAXLEN DESC
+++ CHECK OVERLONG DESC
FAILED
FAILED
+++ CHECK BAD KEY ID
Makefile:42: recipe for target 'run' failed
make[3]: *** [run] Error 1
make[3]: Leaving directory '/home/buildd/packages/modified/keyutils-1.5.9/tests'
Makefile:200: recipe for target 'test' failed
make[2]: *** [test] Error 2


The test log file says:

--------------
Session Keyring
 400274503 --alswrv   1000  1000  keyring: RHTS/keyctl/15273
==============
+++ CHECK BAD KEY ID
echo -n stuff | keyctl padd user wibble 0
add_key: Invalid argument
++++ FINISHED TEST: FAIL
---------------

I've not yet worked out the runes to run the test manually and investigate. Any 
clues on how to track this down welcome.

-- System Information:
Debian Release: 7.5
  APT prefers stable
  APT policy: (990, 'stable')
Architecture: i386 (i686)

Kernel: Linux 3.2.0-kvm-i386-20110111 (SMP w/1 CPU core)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

--- End Message ---
--- Begin Message ---
Source: keyutils
Source-Version: 1.5.9-5

We believe that the bug you reported is fixed in the latest version of
keyutils, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christian Kastner <[email protected]> (supplier of updated keyutils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 26 Jul 2014 23:39:12 +0200
Source: keyutils
Binary: keyutils keyutils-dbg libkeyutils1 libkeyutils-dev
Architecture: source i386
Version: 1.5.9-5
Distribution: unstable
Urgency: low
Maintainer: Christian Kastner <[email protected]>
Changed-By: Christian Kastner <[email protected]>
Description:
 keyutils   - Linux Key Management Utilities
 keyutils-dbg - Linux Key Management Utilities (debug)
 libkeyutils-dev - Linux Key Management Utilities (development)
 libkeyutils1 - Linux Key Management Utilities (library)
Closes: 754206
Changes:
 keyutils (1.5.9-5) unstable; urgency=low
 .
   * debian/rules:
     - Also exclude arm64 from maxdesclen test, fixing a FTBFS. Closes: #754206
   * debian/patches (refreshed):
     - 0009-Use-bash-to-execute-the-tests.patch
       0010-enable-skipping-tests-req-root.patch
       0016-Enable-skipping-of-MAXDESCLEN-tests.patch
       Refreshed DEP3 headers
Checksums-Sha1:
 a4591498dd103d91491c7a8059b76b4198742405 2080 keyutils_1.5.9-5.dsc
 1bd94eaff2f451b402f3a41796b84bf04512c408 14596 keyutils_1.5.9-5.debian.tar.xz
 b5b44604eab5be0c9a36e0b171eaf8e928389c1d 52782 keyutils_1.5.9-5_i386.deb
 60da6ab3f0a3e1292a9ae4485c584f9eed4ccea0 50262 keyutils-dbg_1.5.9-5_i386.deb
 75cc5b538bcfa715699a2e8459923744c4d095d6 11882 libkeyutils1_1.5.9-5_i386.deb
 33a0e83b31cebdf5eb5933700af6addaed091463 37298 libkeyutils-dev_1.5.9-5_i386.deb
Checksums-Sha256:
 8c8ca9ef9274046901b107f143260bd1255387939ee517ae842829bd167fd49d 2080 
keyutils_1.5.9-5.dsc
 8cef47fc1fd688cc54e36cbb7cee26f38b38d10a1c59af8d8dc0869a0e4359fc 14596 
keyutils_1.5.9-5.debian.tar.xz
 7a52cd3b139686be9cc9df66ee5eea863101aed9f07124063c3bb825d43e1053 52782 
keyutils_1.5.9-5_i386.deb
 ec46f2e2580922dd1cd1c6f11319e38c217350658893a266bc01997e0c182a76 50262 
keyutils-dbg_1.5.9-5_i386.deb
 c88d7bb824af0c34eb8986f5af85f632c0a6aa2f94234628235265bbfe078977 11882 
libkeyutils1_1.5.9-5_i386.deb
 2376075f3da4d43b2691587fa65e298c34bfcd619446250ac2d0efbd3799cea5 37298 
libkeyutils-dev_1.5.9-5_i386.deb
Files:
 3a1e7fdc115971feaa0a2248866ec348 52782 admin optional keyutils_1.5.9-5_i386.deb
 bdea3aafdcfae46246e44592709c3615 50262 debug extra 
keyutils-dbg_1.5.9-5_i386.deb
 00429656a5336696831c2240c9b324b6 11882 libs standard 
libkeyutils1_1.5.9-5_i386.deb
 fb57d85ff152bf5baec9a7cf64711f0f 37298 libdevel optional 
libkeyutils-dev_1.5.9-5_i386.deb
 6eef0fd9c6cec3761bf79c57ac874aa5 2080 admin optional keyutils_1.5.9-5.dsc
 f70daffa24726ed4c9a06c0ed1175021 14596 admin optional 
keyutils_1.5.9-5.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=aRJr
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to