Your message dated Sun, 30 Jun 2024 22:19:58 +0000
with message-id <e1so2tq-001bl5...@fasolo.debian.org>
and subject line Bug#886696: fixed in openafs 1.8.12~pre1-1
has caused the Debian Bug report #886696,
regarding openafs: FTBFS on alpha: rx/event #8 and rx/perf #3 failed
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
886696: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=886696
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: openafs
Version: 1.8.0~pre4-1
Severity: important
Tags: upstream
Justification: fails to build from source (but built successfully in the past)
User: debian-al...@lists.debian.org
Usertags: alpha

Hi, Ben (and whoever else maintains openafs in Debian these days).

As you may have noticed, the latest build of openafs for alpha
(admittedly not a release architecture) encountered two test suite
failures:

  Failed Set                 Fail/Total (%) Skip Stat  Failing Tests
  -------------------------- -------------- ---- ----  ------------------------
  rx/event                      1/8     12%    0    0  8
  rx/perf                       1/4     25%    0    1  3
  
  Failed 2/704 tests, 99.72% okay, 1 test skipped.
  Files=23,  Tests=704,  109.00 seconds (3.61 usr + 2.26 sys = 5.87 CPU)
  Makefile:24: recipe for target 'check' failed

I don't have additional details, but perhaps you can reproduce the
problem on a porter box.

Could you please take a look?

Thanks!

-- 
Aaron M. Ucko, KB1CJC (amu at alum.mit.edu, ucko at debian.org)
http://www.mit.edu/~amu/ | http://stuff.mit.edu/cgi/finger/?a...@monk.mit.edu

--- End Message ---
--- Begin Message ---
Source: openafs
Source-Version: 1.8.12~pre1-1
Done: Benjamin Kaduk <ka...@mit.edu>

We believe that the bug you reported is fixed in the latest version of
openafs, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 886...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Benjamin Kaduk <ka...@mit.edu> (supplier of updated openafs package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 30 Jun 2024 14:42:29 -0700
Source: openafs
Architecture: source
Version: 1.8.12~pre1-1
Distribution: unstable
Urgency: medium
Maintainer: Benjamin Kaduk <ka...@mit.edu>
Changed-By: Benjamin Kaduk <ka...@mit.edu>
Closes: 886696 1014397 1060896 1069781
Changes:
 openafs (1.8.12~pre1-1) unstable; urgency=medium
 .
   * New upstream release candidate.
     From 1.8.12pre1:
       - Support Linux versions through 6.9 (Closes: #1060896).
       - Wait to run rx-perf test until server has started (Closes: #886696).
       - Avoid unsupported relocation type on AArch64 kmods (Closes: 1069781).
     From 1.8.11:
       - Flush Linux VFS dentry caches from `fs flush*` commands, reducing the
         need to write to /proc/sys/vm/drop_caches when troubleshooting.
       - Various bugfixes to avoid crashes and potential memory corruption.
       - Additional warnings in server logs: when an older version of a volume
         is restored, and when bosserver is not started in restricted mode.
       - Improve checks to avoid running RPCs when spurious packets are
         received.
       - Update to CellServDB from grand.central.org from 31 Oct 2023.
       - Address a couple potential sources of performance degradation in
         clients.
       - Refresh cache entries when size mismatches are detected.
   * Drop alternative dependency on kernel-package from openafs-modules-source;
     it has been gone since stretch (Closes: #1014397).
   * Re-enable rx-perf test, disabled since 1.8.8.1-2, after upstream's change.
   * Switch from pkg-config to pkgconf.
Checksums-Sha1:
 62489958a3cb6d7b40e2a9e3f7b6315cc8fd38be 3685 openafs_1.8.12~pre1-1.dsc
 101dea3e6bffed89b552855e8084e39761656911 6728704 
openafs_1.8.12~pre1.orig.tar.xz
 da75eb9c90e04321cf0f7f41ac1ce4b21faa1ee8 140504 
openafs_1.8.12~pre1-1.debian.tar.xz
 24a8f37eb7a0dd8b319edc4776cbf0e886d23308 18006 
openafs_1.8.12~pre1-1_amd64.buildinfo
Checksums-Sha256:
 12be6dd716bd796f7bd680c036570e86d1d4bf6626f4154b54a6ba9641a3eb6c 3685 
openafs_1.8.12~pre1-1.dsc
 a08810bd47363d4de0927ec3c4a7fdf4514c8c2314384c20f2e4a6511fdd671a 6728704 
openafs_1.8.12~pre1.orig.tar.xz
 783c604f1a7e44badc5002d2002dc7ee4a46d0487318008c3becca18bdac33f9 140504 
openafs_1.8.12~pre1-1.debian.tar.xz
 067b9112f971feb092da3bc1a87623f33aeb8917e82ede20939f4fa2ca087afe 18006 
openafs_1.8.12~pre1-1_amd64.buildinfo
Files:
 82787bd07fbbca2dbfd42865196f60c3 3685 net optional openafs_1.8.12~pre1-1.dsc
 8bfa1b5e5b09a5273e5a1e5b3d986ef0 6728704 net optional 
openafs_1.8.12~pre1.orig.tar.xz
 71b1bb52bd8b71afeeb8827b8f004fb1 140504 net optional 
openafs_1.8.12~pre1-1.debian.tar.xz
 12631dd5412ae225f2e39c5dc563e135 18006 net optional 
openafs_1.8.12~pre1-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=1fjy
-----END PGP SIGNATURE-----

Attachment: pgpMMF0s26AIM.pgp
Description: PGP signature


--- End Message ---

Reply via email to