• Bug#1067669: FTBFS on 32-bit: test possible_underflow ... FAILED

    From Andrey Rakhmatullin@21:1/5 to All on Mon Mar 25 12:30:01 2024
    Source: rust-uutils-term-grid
    Version: 0.6.0-1
    Severity: serious
    Tags: ftbfs

    test uutils_ls::columns_width_30 ... ok
    test possible_underflow ... FAILED

    failures:

    ---- possible_underflow stdout ----
    thread 'possible_underflow' panicked at 'attempt to multiply with overflow', /usr/src/rustc-1.70.0/library/core/src/num/mod.rs:371:5


    -- System Information:
    Debian Release: trixie/sid
    APT prefers unstable-debug
    APT policy: (500, 'unstable-debug'), (500, 'testing-debug'), (500, 'unstable'), (500, 'testing'), (101, 'experimental')
    Architecture: amd64 (x86_64)
    Foreign Architectures: i386

    Kernel: Linux 6.7.9-amd64 (SMP w/4 CPU threads; PREEMPT)
    Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
    Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8), LANGUAGE not set
    Shell: /bin/sh linked to /usr/bin/dash
    Init: systemd (via /run/systemd/system)
    LSM: AppArmor: enabled

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Debian Bug Tracking System@21:1/5 to All on Thu Mar 28 19:00:02 2024
    This is a multi-part message in MIME format...

    Your message dated Thu, 28 Mar 2024 17:53:15 +0000
    with message-id <E1rptwB-00C8VY-0J@fasolo.debian.org>
    and subject line Bug#1067669: fixed in rust-uutils-term-grid 0.6.0-2
    has caused the Debian Bug report #1067669,
    regarding FTBFS on 32-bit: test possible_underflow ... FAILED
    to be marked as done.

    This means that you claim that the problem has been dealt with.
    If this is not the case it is now your responsibility to reopen the
    Bug report if necessary, and/or fix the problem forthwith.

    (NB: If you are a system administrator and have no idea what this
    message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org
    immediately.)


    --
    1067669: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067669
    Debian Bug Tracking System
    Contact owner@bugs.debian.org with problems

    Received: (at submit) by bugs.debian.org; 25 Mar 2024 11:20:52 +0000 X-Spam-Checker-Version: SpamAssassin 3.4.6-bugs.debian.org_2005_01_02
    (2021-04-09) on buxtehude.debian.org
    X-Spam-Level:
    X-Spam-Status: No, score=-8.9 required=4.0 tests=BAYES_00,DKIM_SIGNED,
    DKIM_VALID,FORGED_SPF_HELO,FOURLA,FROMDEVELOPER,SPF_HELO_PASS,SPF_NONE,
    XMAILER_REPORTBUG autolearn=ham autolearn_force=no
    version=3.4.6-bugs.debian.org_2005_01_02
    X-Spam-Bayes: score:0.0000 Tokens: new, 12; hammy, 150; neutral, 53; spammy,
    0. spammytokens: hammytokens:0.000-+--trixie, 0.000-+--sk:taint_o,
    0.000-+--sk:TAINT_O, 0.000-+--sk:taint_u, 0.000-+--sk:TAINT_U Return-path: <wrar@debian.org>
    Received: from wrar.name ([116.203.248.210]:37222 helo=durkon.wrar.name)
    by buxtehude.debian.org with esmtps (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256)
    (Exim 4.94.2)
    (env