• Bug#1067654: tpm2-abrmd: Tests fail on 32-bit t64 arches

    From Michael Hudson-Doyle@21:1/5 to All on Mon Mar 25 08:40:01 2024
    This is a multi-part MIME message sent by reportbug.


    Package: tpm2-abrmd
    Severity: serious
    Tags: patch ftbfs
    Justification: fails to build from source (but built successfully in the past) User: ubuntu-devel@lists.ubuntu.com
    Usertags: origin-ubuntu noble ubuntu-patch
    X-Debbugs-Cc: michael.hudson@ubuntu.com

    Dear Maintainer,

    In Ubuntu, the attached patch was applied to achieve the following:

    * Disable testsuite on armhf for now (the mocking the test harness
    does fails when _FILE_BITS == 64).

    This is very similar to https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067418

    Thanks for considering the patch.


    -- System Information:
    Debian Release: trixie/sid
    APT prefers mantic-updates
    APT policy: (500, 'mantic-updates'), (500, 'mantic-security'), (500, 'mantic'), (100, 'mantic-backports')
    Architecture: amd64 (x86_64)
    Foreign Architectures: i386

    Kernel: Linux 6.5.0-25-generic (SMP w/16 CPU threads; PREEMPT)
    Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE
    Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_NZ.UTF-8:en
    Shell: /bin/sh linked to /usr/bin/dash
    Init: systemd (via /run/systemd/system)
    LSM: AppArmor: enabled

    diff -Nru tpm2-abrmd-3.0.0/debian/control tpm2-abrmd-3.0.0/debian/control
    diff -Nru tpm2-abrmd-3.0.0/debian/rules tpm2-abrmd-3.0.0/debian/rules
    --- tpm2-abrmd-3.0.0/debian/rules 2022-12-12 12:42:50.000000000 +1300
    +++ tpm2-abrmd-3.0.0/debian/rules 2024-03-25 20:21:21.000000000 +1300
    @@ -4,9 +4,14 @@
    export DEB_CFLAGS_MAINT_APPEND = -Wall

    # Some variables:
    +DEB_HOST_ARCH ?= $(shell dpkg-architecture -qDEB_HOST_ARCH)
    DEB_HOST_ARCH_OS ?= $(shell dpkg-architecture -qDEB_HOST_ARCH_OS)
    DEB_HOST_ARCH_CPU ?= $(shell dpkg-architecture -qDEB_HOST_ARCH_CPU)

    +ifeq ($(DEB_HOST_ARCH),armhf)
    +DEB_BUILD_OPTIONS+=nocheck
    +endif
    +
    %:
    dh $@ --exclude=.la --with autoreconf

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Sebastian Ramacher@21:1/5 to All on Thu Apr 11 23:30:02 2024
    Dear maintainer,

    I've prepared an NMU for tpm2-abrmd (versioned as 3.0.0-1.1). The diff
    is attached to this message.

    Cheers
    --
    Sebastian Ramacher

    diff -Nru tpm2-abrmd-3.0.0/debian/changelog tpm2-abrmd-3.0.0/debian/changelog --- tpm2-abrmd-3.0.0/debian/changelog 2022-12-12 00:47:34.000000000 +0100
    +++ tpm2-abrmd-3.0.0/debian/changelog 2024-04-11 23:12:31.000000000 +0200
    @@ -1,3 +1,13 @@
    +tpm2-abrmd (3.0.0-1.1) unstable; urgency=medium
    +
    + * Non-maintainer upload
    +
    + [ Michael Hudson-Doyle ]
    + * Disable testsuite on armhf for now (the mocking the test harness
    + does fails when _FILE_BITS == 64) (Closes: #1067654).
    +
    + -- Sebastian Ramacher <sramacher@debian.org> Thu, 11 Apr 2024 23:12:31 +0200 +
    tpm2-abrmd (3.0.0-1) unstable; urgency=low

    [ Debian Janitor ]
    diff -Nru tpm2-abrmd-3.0.0/debian/rules tpm2-abrmd-3.0.0/debian/rules
    --- tpm2-abrmd-3.0.0/debian/rules 2022-12-12 00:42:50.000000000 +0100
    +++ tpm2-abrmd-3.0.0/debian/rules 2024-04-11 23:12:31.000000000 +0200
    @@ -4,9 +4,14 @@
    export DEB_CFLAGS_MAINT_APPEND = -Wall

    # Some variables:
    +DEB_HOST_ARCH ?= $(shell dpkg-architecture -qDEB_HOST_ARCH)
    DEB_HOST_ARCH_OS ?= $(shell dpkg-architecture -qDEB_HOST_ARCH_OS)
    DEB_HOST_ARCH_CPU ?= $(shell
  • From Debian Bug Tracking System@21:1/5 to All on Fri Apr 12 00:00:02 2024
    This is a multi-part message in MIME format...

    Your message dated Thu, 11 Apr 2024 21:51:02 +0000
    with message-id <E1rv2Jy-00C2LE-O5@fasolo.debian.org>
    and subject line Bug#1067654: fixed in tpm2-abrmd 3.0.0-1.1
    has caused the Debian Bug report #1067654,
    regarding tpm2-abrmd: Tests fail on 32-bit t64 arches
    to be marked as done.

    This means that you claim that the problem has been dealt with.
    If this is not the case it is now your responsibility to reopen the
    Bug report if necessary, and/or fix the problem forthwith.

    (NB: If you are a system administrator and have no idea what this
    message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org
    immediately.)


    --
    1067654: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067654
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems

    Received: (at submit) by bugs.debian.org; 25 Mar 2024 07:27:48 +0000 X-Spam-Checker-Version: SpamAssassin 3.4.6-bugs.debian.org_2005_01_02
    (2021-04-09) on buxtehude.debian.org
    X-Spam-Level:
    X-Spam-Status: No, score=-15.1 required=4.0 tests=BAYES_00,
    BODY_INCLUDES_PACKAGE,FOURLA,HAS_PACKAGE,RDNS_NONE,SPF_PASS,
    XMAILER_REPORTBUG autolearn=ham autolearn_force=no
    version=3.4.6-bugs.debian.org_2005_01_02
    X-Spam-Bayes: score:0.0000 Tokens: new, 28; hammy, 150; neutral, 141; spammy,
    0. spammytokens: hammytokens:0.000-+--X-Debbugs-Cc,
    0.000-+--XDebbugsCc, 0.000-+--armhf, 0.000-+--trixie,
    0.000-+--sk:taint_o
    Return-path: <michael.hudson@ubuntu.com>
    Received: from [2407:7000:9cc3:7300:c7a2:3564:2db4:244d] (port=51850 helo=[127.0.1.1])
    by buxtehude.debian.org with esmtp (Exim 4.94.2)
    (envelope-from <michael.hudson@ubuntu.com>)
    id 1roekE-005tKP-ME