Your message dated Wed, 01 Dec 2021 02:49:11 +0000
with message-id <e1msfgf-0001gg...@fasolo.debian.org>
and subject line Bug#979743: fixed in rungetty 1.2-16.1
has caused the Debian Bug report #979743,
regarding rungetty: FTBFS with glibc 2.32
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
979743: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979743
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: rungetty
Version: 1.2-16
Severity: normal
Tags: patch
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu hirsute ubuntu-patch
X-Debbugs-Cc: lo...@ubuntu.com

Hi,

rungetty currently FTBFS against glibc 2.32, which is used in the
development release of Ubuntu (and should be in Debian soon).

This is because it uses sys_errlist instead of strerror(), which is also
supported in earlier versions of glibc.

In Ubuntu, the attached patch was applied to achieve the following:

  * Fix FTBFS against glibc 2.32 by using strerror() instead of sys_errlist.

Thanks for considering the patch.

Logan
diff -Nru rungetty-1.2/debian/patches/glibc-2.32.patch 
rungetty-1.2/debian/patches/glibc-2.32.patch
--- rungetty-1.2/debian/patches/glibc-2.32.patch        1969-12-31 
19:00:00.000000000 -0500
+++ rungetty-1.2/debian/patches/glibc-2.32.patch        2021-01-10 
19:01:08.000000000 -0500
@@ -0,0 +1,60 @@
+--- a/rungetty.c
++++ b/rungetty.c
+@@ -313,7 +313,7 @@
+           {
+             if (errno == EINTR || errno == EIO || errno == ENOENT)
+               exit (0);
+-            error ("%s: read: %s", tty, sys_errlist[errno]);
++            error ("%s: read: %s", tty, strerror(errno));
+           }
+         if (c == '\n' || c == '\r')
+           {
+@@ -430,7 +430,7 @@
+       while ((logname = get_logname ()) == 0);
+       execl (_PATH_LOGIN, _PATH_LOGIN, "--", logname, NULL);
+     }
+-  error ("%s: can't exec " _PATH_LOGIN ": %s", tty, sys_errlist[errno]);
++  error ("%s: can't exec " _PATH_LOGIN ": %s", tty, strerror(errno));
+   exit (0);
+ }
+ 
+@@ -446,7 +446,7 @@
+   strcpy (buf, "/dev/");
+   strcat (buf, tty);
+   if (chown (buf, 0, 0) || chmod (buf, 0600))
+-    error ("%s: %s", buf, sys_errlist[errno]);
++    error ("%s: %s", buf, strerror(errno));
+ 
+   sa.sa_handler = SIG_IGN;
+   sa.sa_flags = 0;
+@@ -461,7 +461,7 @@
+    */
+   if ((fd = open (buf, O_RDWR, 0)) < 0
+       || ioctl (fd, TIOCSCTTY, (void *) 1) == -1)
+-    error ("%s: cannot open tty: %s", buf, sys_errlist[errno]);
++    error ("%s: cannot open tty: %s", buf, strerror(errno));
+   if (!isatty (fd))
+     error ("%s: not a tty", buf);
+ 
+@@ -475,11 +475,11 @@
+ 
+   if (open (buf, O_RDWR, 0) != 0)
+     error ("%s: cannot open as standard input: %s", buf,
+-         sys_errlist[errno]);
++         strerror(errno));
+ 
+   /* Set up standard output and standard error file descriptors. */
+   if (dup (0) != 1 || dup (0) != 2)
+-    error ("%s: dup problem: %s", buf, sys_errlist[errno]);
++    error ("%s: dup problem: %s", buf, strerror(errno));
+ 
+   /* Write a reset string to the terminal. This is very linux-specific
+      and should be checked for other systems. */
+@@ -606,6 +606,6 @@
+   nice (priority);
+ 
+   execvp (program_run, &argv[optind + 1]);
+-  error ("%s: can't exec %s : %s", tty, program_run, sys_errlist[errno]);
++  error ("%s: can't exec %s : %s", tty, program_run, strerror(errno));
+   exit (0);
+ }
diff -Nru rungetty-1.2/debian/patches/series rungetty-1.2/debian/patches/series
--- rungetty-1.2/debian/patches/series  2016-01-04 13:13:07.000000000 -0500
+++ rungetty-1.2/debian/patches/series  2021-01-10 19:00:04.000000000 -0500
@@ -6,3 +6,4 @@
 06_initgroups
 07_clear-not-reset
 08_autologin-on-all-ttys
+glibc-2.32.patch

--- End Message ---
--- Begin Message ---
Source: rungetty
Source-Version: 1.2-16.1
Done: Adrian Bunk <b...@debian.org>

We believe that the bug you reported is fixed in the latest version of
rungetty, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 979...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Adrian Bunk <b...@debian.org> (supplier of updated rungetty package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 07 Nov 2021 17:45:12 +0200
Source: rungetty
Architecture: source
Version: 1.2-16.1
Distribution: unstable
Urgency: medium
Maintainer: Rhonda D'Vine <rho...@debian.org>
Changed-By: Adrian Bunk <b...@debian.org>
Closes: 979743
Changes:
 rungetty (1.2-16.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Add patch from Logan Rosen to fix FTBFS with glibc 2.32.
     (Closes: #979743)
Checksums-Sha1:
 9fdb856bc459214927f141bd986b55b0a299c7bb 1658 rungetty_1.2-16.1.dsc
 6841fb796c101ab64b257f8d591f727a226f3f13 6520 rungetty_1.2-16.1.debian.tar.xz
Checksums-Sha256:
 be18244fb4ec6eba23a2b65e1e6588e618930a9447716fb5cf7ee4b781d95d85 1658 
rungetty_1.2-16.1.dsc
 09f14655c76529d1cdcea272e19efe9faf8dd26a1c2e2f496953fe1dea74f317 6520 
rungetty_1.2-16.1.debian.tar.xz
Files:
 5cf55df6087b09ce5cde1d65db9af181 1658 admin optional rungetty_1.2-16.1.dsc
 c530839f62986768e7857274cf7535fe 6520 admin optional 
rungetty_1.2-16.1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmGH/mAACgkQiNJCh6LY
mLGNzw/+N8O3U//5wvCGfiw1UVQUwmMqOIPb4G1TobG9QYJEP31AgJR37dE2/VDR
Ti4YHfoirXnKZ1zoisKeCACSCn2p+PfRQet8DBLHKfER+bNWjdY/B78m+49rKn/1
7Z878BSkv6TpNCXAPXRhU9rPO3+56lf2ItubPzoVT5j4cVCaFDzL9AHYt5OqrKhw
fWyCSPpamdHs2HfLlioEaTVDP7mGqHvWfplOCQEafXUkyjFwnvTap7kLCFayhHv8
LyJeObVXgi9rAZsNUSkStM/cgsqdsp7gF/fVpkPMu5z/5Zb8YW39k9w5AAyouafH
mMK+3MZxrr3o+PruvhgYo2GJ6vBIHSjFchHlPrVPzadAHQLEBcJjfdFHImK+sgzv
yvJ0tQA7aproG/aJJJvoUPwOwKS4ZpaGHmKun1teDAAwNoO2nALGepMfIkOcBPXo
3X8Dw4yb53hrMaU+t4Mj9sdKXgT5Ln/fbrMeVQ9FLjmIGHfAcIiiRs1oqfFkUq0g
oLWaZNdpdCuHu2W8dec6MTwcq87J7X8g0tgRFP4TUG2gh2ogiBPK9S457Dj8YiTY
BmaXApVj47vTbVukRwuo0rcwd58I/p3KZC6t50G5MyakFKCpszsKrk9HM1wgDknQ
xRKw+9UVsguppTy4VpdJvTrsy7MWuoNYMBd3xQYPXjI51eRcTYs=
=bZlE
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to