Your message dated Sun, 13 Apr 2025 10:35:01 +0000
with message-id <e1u3ug1-00ezfh...@fasolo.debian.org>
and subject line Bug#1102918: fixed in keyutils 1.6.3-6
has caused the Debian Bug report #1102918,
regarding keyutils: FTBFS because of failing test on ppc64el
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1102918: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1102918
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: keyutils
Version: 1.6.3-5
Severity: serious

The patches for fixing a FBTFS in containerized environments uncovered
another latent bug, or possibly two separate bugs.

First, some tests involving an overlong description assume a page size
of 4K, which is not the case on at least some pcc64el where I have
observed it to be 64K. Hence, an expected error is never encountered,
leading the test suite to fail.

Second, even accounting for a 64K overlong description, the expected
errno is EDQUOT, whereas the actual return code is EINVAL.

--- End Message ---
--- Begin Message ---
Source: keyutils
Source-Version: 1.6.3-6
Done: Christian Kastner <c...@debian.org>

We believe that the bug you reported is fixed in the latest version of
keyutils, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1102...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christian Kastner <c...@debian.org> (supplier of updated keyutils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 13 Apr 2025 12:23:08 +0200
Source: keyutils
Architecture: source
Version: 1.6.3-6
Distribution: unstable
Urgency: medium
Maintainer: Christian Kastner <c...@debian.org>
Changed-By: Christian Kastner <c...@debian.org>
Closes: 1102918
Changes:
 keyutils (1.6.3-6) unstable; urgency=medium
 .
   * Cherry-pick three patches from upstream HEAD.
     These are the only meaningful changes since 1.6.3, and cherry-picking
     them seems less complicated than then +git approach.
   * Add test-Don-t-rely-on-PAGE_SIZE-for-maxdesc-length.patch (Closes: 
#1102918)
Checksums-Sha1:
 454956ba1efae8fc78ae0e38e2aaa6c1e1f91fe6 2100 keyutils_1.6.3-6.dsc
 707251ca69ad0449a57eef177fe3e9c5010640be 16588 keyutils_1.6.3-6.debian.tar.xz
 4ac39675e2c7a2d6293f273af57dee939d3196bb 5922 keyutils_1.6.3-6_source.buildinfo
Checksums-Sha256:
 e63869474c390d5d5bdee8492f7b2f4d6034ff10d8190da18593620c0f35fbf8 2100 
keyutils_1.6.3-6.dsc
 6fc3c1217b8e92df9dff73e4919c45dff4ada5fd414ab57329af487f4476466a 16588 
keyutils_1.6.3-6.debian.tar.xz
 494179216329a763e910a82ffbf266ff6e0d3dfe62fb73924caff81c27ad563e 5922 
keyutils_1.6.3-6_source.buildinfo
Files:
 b3652db15434082332f360da797d5ab0 2100 admin optional keyutils_1.6.3-6.dsc
 ecf4354142a5e6f2d99d613d77b4037c 16588 admin optional 
keyutils_1.6.3-6.debian.tar.xz
 72c602a799a2cdf7b1b2b5eaca0467c6 5922 admin optional 
keyutils_1.6.3-6_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=L+K2
-----END PGP SIGNATURE-----

Attachment: pgptiiaq9A0nK.pgp
Description: PGP signature


--- End Message ---

Reply via email to