Your message dated Wed, 8 Jun 2022 21:14:30 +0200 with message-id <e8b7b416-e19a-043b-f6dd-4658f5222...@debian.org> and subject line libluajit2 is replacing libluajit on ppc64el has caused the Debian Bug report #1011303, regarding please replace (build) dependency luajit with lua on ppc64el to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1011303: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011303 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Source: luajit, knot-resolver Control: found -1 luajit/2.1.0~beta3+git20210112+dfsg-2 Control: found -1 knot-resolver/5.4.4-1 Severity: serious Tags: sid bookworm X-Debbugs-CC: debian...@lists.debian.org User: debian...@lists.debian.org Usertags: breaks needs-update Dear maintainer(s),With a recent upload of luajit the autopkgtest of knot-resolver fails in testing when that autopkgtest is run with the binary packages of luajit from unstable. It passes when run with only packages from testing. In tabular form:pass fail luajit from testing 2.1.0~beta3+git20210112+dfsg-2 knot-resolver from testing 5.4.4-1 all others from testing from testing I copied some of the output at the bottom of this report.Currently this regression is blocking the migration of luajit to testing [1]. Due to the nature of this issue, I filed this bug report against both packages. Can you please investigate the situation and reassign the bug to the right package?More information about this bug and the reason for filing it can be found on https://wiki.debian.org/ContinuousIntegration/RegressionEmailInformation Paul [1] https://qa.debian.org/excuses.php?package=luajit https://ci.debian.net/data/autopkgtest/testing/ppc64el/k/knot-resolver/18781119/log.gz /usr/sbin/kresd + /usr/bin/kdig roundtrip tests ------------ workdir: /tmp/autopkgtest-lxc.7e24ymsu/downtmp/roundtrip-artifacts IP addr: 127.148.62.213kresd args: --addr=127.148.62.213@8053 --tls=127.148.62.213@8853 --noninteractive --config=/tmp/autopkgtest-lxc.7e24ymsu/downtmp/roundtrip-artifacts/kresd.conf --verbose --verbose --verbosemake Certificate Authority key and certificate ---------------------------------------------- Generating a 3072 bit RSA private key... Generating a self signed certificate... X.509 Certificate Information: Version: 3 Serial Number (hex): 2b34f0d7e93fd713653dda432ddeffed7f9f834b Validity: Not Before: Fri Jan 28 19:35:43 UTC 2022 Not After: Wed Feb 09 19:35:43 UTC 2022 Subject: CN=testing certificate authority (NOT FOR PRODUCTION) Subject Public Key Algorithm: RSA Algorithm Security Level: High (3072 bits) Modulus (bits 3072): 00:98:66:36:e9:ce:d2:58:89:bc:a9:ec:ac:21:5e:4b d2:f3:70:af:5c:41:11:d2:0f:fa:e2:f1:54:65:bc:86 06:4c:55:9f:0e:c3:72:8a:81:75:c3:be:2a:37:20:6a ce:45:4d:22:00:92:d8:f3:ff:0c:d1:c3:9e:1b:0e:f9 c4:48:38:22:84:f7:a0:6a:bd:e9:34:9d:91:35:00:7b 97:28:c7:6b:49:14:ed:50:81:07:7e:cc:cb:3c:79:cb fb:52:3d:3c:e0:c5:d9:1d:b5:1f:49:f4:55:74:db:a9 e7:58:fd:83:b6:56:ef:82:07:8f:6f:af:ec:26:b5:40 b4:23:1f:5c:b5:13:47:28:13:8a:58:58:19:f4:8f:3d 7e:12:c2:75:0c:7e:bd:f3:7d:89:f6:b6:3f:8f:63:99 1b:9d:e6:0c:63:fa:a5:5c:5e:08:27:d7:fd:af:3f:7c 54:74:4d:44:3b:ed:66:1a:05:ca:60:94:87:6d:47:c2 5e:8c:3f:1b:d9:60:21:4f:a4:30:1c:0a:21:da:34:0d a5:cc:df:70:f4:82:71:d4:05:eb:31:0a:2f:59:db:dd 5a:38:15:2a:39:c0:1c:14:2c:cc:3e:b1:dc:97:3d:d7 ff:95:3c:b7:9a:c9:e4:e4:d1:ee:8e:5f:f0:41:d1:f8 2d:4b:6a:36:8d:e8:33:ad:92:b1:7d:65:07:29:56:36 4a:ee:62:75:58:70:f0:99:31:b5:d9:08:8c:68:13:a2 f6:93:38:a9:d7:f9:84:a2:06:29:6f:c8:4c:53:ec:de 37:4b:0a:3c:a9:69:df:57:fd:f0:94:da:d1:a8:5a:8d 40:80:e4:80:5d:85:4c:4a:2f:94:81:9f:e5:a6:a2:49 10:bf:ff:10:11:9f:c6:9d:4d:04:d4:46:f3:25:7c:62 93:7a:43:c9:2d:6a:d5:5a:f2:4a:b7:35:5e:a1:08:f4 a7:30:7a:50:a2:67:c1:f7:2b:17:43:29:0e:3b:34:48 c5 Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): TRUE Path Length Constraint: 1 Name Constraints (critical): Permitted: DNSname: example Key Usage (critical): Certificate signing. Subject Key Identifier (not critical): 9d5a5828bca2466ede2e930de28e9316dcab390d Other Information: Public Key ID: sha1:9d5a5828bca2466ede2e930de28e9316dcab390d sha256:f449822d822c9521c68c0b9b0135dd0fe61f7704c65d4f695daf70b73cb4b116 Public Key PIN: pin-sha256:9EmCLYIslSHGjAubATXdD+YfdwTGXU9pXa9wtzy0sRY= Signing certificate... make Bogus Certificate Authority key and certificate ---------------------------------------------------- Generating a 3072 bit RSA private key... Generating a self signed certificate... X.509 Certificate Information: Version: 3 Serial Number (hex): 11e67e6b00d10bc15b65d02f19592b5ddea5cedd Validity: Not Before: Fri Jan 28 19:35:44 UTC 2022 Not After: Wed Feb 09 19:35:44 UTC 2022 Subject: CN=testing certificate authority (NOT FOR PRODUCTION) Subject Public Key Algorithm: RSA Algorithm Security Level: High (3072 bits) Modulus (bits 3072): 00:db:a6:14:19:6f:9f:dc:33:b9:01:28:2f:42:f2:8a f7:c0:90:77:47:88:b7:52:5c:2c:94:f4:ce:f8:bb:4d 82:ef:5c:5d:5a:11:88:e8:8a:ef:1e:40:53:2e:a6:d1 07:af:56:e8:05:4a:ed:1f:ff:70:4e:1a:dd:f5:f7:c4 fc:61:62:f5:a1:55:29:54:16:7c:af:98:a1:8d:70:f7 b7:e2:aa:4d:78:2b:55:2f:58:cc:45:a4:2c:92:ff:18 b4:e3:8f:83:d4:de:39:98:19:8f:40:e3:c4:78:53:43 53:b1:ab:c1:33:f6:61:e1:4c:17:f0:d1:58:a9:02:af e3:7b:6b:64:7a:5c:11:58:d1:8b:40:77:49:07:cb:e2 16:f5:e9:d8:ad:13:56:ab:f1:96:b2:4e:6e:1b:e5:c2 95:8e:d3:3a:fd:fb:c5:da:2f:b6:88:4c:27:f7:14:2d bb:f7:38:c9:55:4d:c3:51:25:61:bf:f1:6d:9c:cd:89 99:76:cf:31:34:ab:6f:22:31:1f:f6:eb:b8:0c:4f:83 1c:90:77:00:14:d5:0a:51:08:cd:32:5b:e8:21:ef:6a 7a:6d:da:07:5b:d2:72:56:75:45:0f:6a:d9:b0:7f:71 59:31:49:b0:e4:45:e6:b6:8d:76:65:3d:96:64:35:27 12:ac:53:95:10:46:17:e2:64:cd:ad:a9:01:82:0d:44 f7:64:fa:4b:9c:42:35:07:75:38:a0:4e:9c:84:e2:69 54:4b:80:1c:09:62:2c:29:df:47:cf:46:69:fd:ab:98 aa:aa:28:a8:ac:3e:99:d8:bc:d9:74:ae:de:d9:0a:9e 54:5d:7c:c5:83:5c:07:1d:52:88:29:4e:0d:bc:51:e9 21:62:ca:6c:3f:e7:b2:d9:a7:72:59:b1:26:e6:ef:5a b5:e5:6e:96:1a:c6:6b:24:9d:1b:04:9c:8d:fd:e9:d8 48:30:c2:78:20:e0:d7:eb:84:84:b9:71:e0:13:70:7d 07 Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): TRUE Path Length Constraint: 1 Name Constraints (critical): Permitted: DNSname: example Key Usage (critical): Certificate signing. Subject Key Identifier (not critical): cb341b3dbac0cbc8607ab48daa2219b3c05fb24d Other Information: Public Key ID: sha1:cb341b3dbac0cbc8607ab48daa2219b3c05fb24d sha256:4ebf7681ca33ddd776669c77039d948f9bcecc420c29cf960efcfef541228aeb Public Key PIN: pin-sha256:Tr92gcoz3dd2Zpx3A52Uj5vOzEIMKc+WDvz+9UEiius= Signing certificate... make End Entity key and certificate ----------------------------------- Generating a 3072 bit RSA private key... Generating a signed certificate... X.509 Certificate Information: Version: 3 Serial Number (hex): 0fb6cbc435bcc30d3736d39d58617c6fc39163c4 Validity: Not Before: Fri Jan 28 19:35:44 UTC 2022 Not After: Mon Feb 07 19:35:44 UTC 2022 Subject: CN=test.example Subject Public Key Algorithm: RSA Algorithm Security Level: High (3072 bits) Modulus (bits 3072): 00:ed:8f:89:4f:42:44:0c:77:25:89:89:fa:56:3c:8f 06:77:67:5a:a4:15:36:d5:59:7a:bb:08:9d:0f:0a:1f 7b:1d:b1:9a:c1:e6:68:71:f9:eb:d8:7e:ea:7f:f7:00 ea:67:4f:7c:dd:0e:ef:88:bf:57:3b:66:f3:a5:9c:9b 67:10:de:5c:a7:5c:e8:d2:0d:c7:d0:62:02:fa:5a:b8 1b:fe:22:59:a8:b9:97:2d:ec:42:0f:8e:33:05:59:d1 36:af:ca:39:82:9d:da:8b:c7:58:94:ca:e7:b2:98:48 31:ed:58:54:bd:41:43:35:e0:14:43:e0:08:60:67:fa f4:e9:81:63:86:b7:3d:66:e1:ac:d1:e6:37:90:e7:4d d5:b6:f7:9f:35:53:cb:cb:90:24:17:e4:9c:43:ee:04 1e:e6:75:b0:22:d3:79:d5:a9:83:51:f5:c9:08:dd:25 91:68:9a:fa:e3:f8:a0:07:71:9a:37:b5:41:3d:5e:8d a3:27:9c:fe:f3:55:fa:b0:33:26:6d:9f:c3:7c:9e:f8 61:3d:7c:76:97:0a:90:af:28:d0:5c:87:f6:86:b8:d7 4e:fe:0a:b7:93:41:77:b6:20:85:a3:17:ec:64:9c:1f ea:98:73:5d:ce:2a:9e:2a:3b:8e:d0:f2:0a:2c:93:50 f7:bd:2d:63:91:0a:c8:98:8e:b4:97:28:e0:af:6c:b1 4b:e3:05:16:02:54:f0:bf:74:a3:c9:47:f9:89:d6:ed 5f:83:30:ae:a6:91:59:31:14:13:d3:71:65:7b:70:61 39:e7:71:7e:0b:2e:8c:55:5a:8f:1f:4a:27:c7:33:0c 48:d7:d8:61:dd:36:21:33:fc:b8:89:d4:48:70:8e:dd f5:f0:26:83:86:4e:b1:89:2f:6b:63:74:dd:eb:c9:be 16:20:15:16:e8:2f:10:89:63:14:2c:40:cd:5d:b4:a0 ae:6b:3f:e1:7d:5b:5a:13:7a:7a:c8:29:28:21:4c:e0 73 Exponent (bits 24): 01:00:01 Extensions: Basic Constraints (critical): Certificate Authority (CA): FALSE Subject Alternative Name (not critical): DNSname: test.example Key Purpose (not critical): TLS WWW Server. Key Usage (critical): Digital signature. Subject Key Identifier (not critical): e7b5b10827689a7f2d6df9f8f862c4822383be14 Authority Key Identifier (not critical): 9d5a5828bca2466ede2e930de28e9316dcab390d Other Information: Public Key ID: sha1:e7b5b10827689a7f2d6df9f8f862c4822383be14 sha256:45999ab3834303a5e1bea7371c8ad58cc57d085d884a0b0354717ecd84829fa0 Public Key PIN: pin-sha256:RZmas4NDA6Xhvqc3HIrVjMV9CF2ISgsDVHF+zYSCn6A= Signing certificate...set up kresd daemon on 127.148.62.213 on ports 8053 (UDP, TCP) and 8853 (TLS)-----------------------------------------------------------------------------/tmp/autopkgtest-lxc.7e24ymsu/downtmp/build.B0Q/src/debian/tests/roundtrip: line 96: 1789 Segmentation fault "$kresd" "${kresd_args[@]}" "$d" 2> "$d/kresd.err"test UDP with kdig ------------------ ;; WARNING: response timeout for 127.148.62.213@8053(UDP) ;; ERROR: failed to query server 127.148.62.213@8053(UDP) cleaning up -----------921111 4 drwxrwxrwt 2 root root 4096 Jan 28 19:35 /tmp/autopkgtest-lxc.7e24ymsu/downtmp/roundtrip-artifacts 927166 8 -rw------- 1 root root 8167 Jan 28 19:35 /tmp/autopkgtest-lxc.7e24ymsu/downtmp/roundtrip-artifacts/bogus-key.pem 927161 4 -rw-r--r-- 1 root root 136 Jan 28 19:35 /tmp/autopkgtest-lxc.7e24ymsu/downtmp/roundtrip-artifacts/ca.template 927176 4 -rw-r--r-- 1 root root 415 Jan 28 19:35 /tmp/autopkgtest-lxc.7e24ymsu/downtmp/roundtrip-artifacts/kresd.conf 927174 4 -rw-r--r-- 1 root root 1602 Jan 28 19:35 /tmp/autopkgtest-lxc.7e24ymsu/downtmp/roundtrip-artifacts/ee-cert.pem 927171 8 -rw------- 1 root root 8170 Jan 28 19:35 /tmp/autopkgtest-lxc.7e24ymsu/downtmp/roundtrip-artifacts/ee-key.pem 927177 4 -rw-r--r-- 1 root root 138 Jan 28 19:35 /tmp/autopkgtest-lxc.7e24ymsu/downtmp/roundtrip-artifacts/kresd.err 927162 8 -rw------- 1 root root 8167 Jan 28 19:35 /tmp/autopkgtest-lxc.7e24ymsu/downtmp/roundtrip-artifacts/ca-key.pem 927167 4 -rw-r--r-- 1 root root 1590 Jan 28 19:35 /tmp/autopkgtest-lxc.7e24ymsu/downtmp/roundtrip-artifacts/bogus-cert.pem 927168 4 -rw-r--r-- 1 root root 92 Jan 28 19:35 /tmp/autopkgtest-lxc.7e24ymsu/downtmp/roundtrip-artifacts/ee.template 927172 4 -rw-r--r-- 1 root root 2218 Jan 28 19:35 /tmp/autopkgtest-lxc.7e24ymsu/downtmp/roundtrip-artifacts/ee-pubkey.pem 927165 4 -rw-r--r-- 1 root root 1590 Jan 28 19:35 /tmp/autopkgtest-lxc.7e24ymsu/downtmp/roundtrip-artifacts/ca-cert.pem==> /tmp/autopkgtest-lxc.7e24ymsu/downtmp/roundtrip-artifacts/kresd.err <== [system] increasing file-descriptor limit: 1024 -> 1048576[tls ] session ticket: epoch 401220, scheduling rotation check in 2671525 msautopkgtest [19:35:47]: test roundtripOpenPGP_signature
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---Hi,The problems with libluajit on ppc64el have been worked around by a new source in our archive libluajit2. As this requires no changes to your package, I'm closing this bug.As an additional potential benefit, libluajit2 is also available on s390x, where libluajit was not.PaulOpenPGP_signature
Description: OpenPGP digital signature
--- End Message ---