Your message dated Tue, 30 Aug 2016 10:23:38 +0000
with message-id <[email protected]>
and subject line Bug#831333: fixed in lua-openssl 20151221-3
has caused the Debian Bug report #831333,
regarding lua-openssl: FTBFS on x32: sysctl system call is unsupported
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
831333: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=831333
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: lua-openssl
Version: 20151221-2
Severity: important
Justification: fails to build from source

Hi, Ondřej.

As you may have noticed, the x32 build of lua-openssl failed:

  In file included from /usr/include/x86_64-linux-gnux32/sys/sysctl.h:63:0,
                   from src/openssl.c:6987:
  /usr/include/x86_64-linux-gnux32/bits/sysctl.h: At top level:
  /usr/include/x86_64-linux-gnux32/bits/sysctl.h:19:3: error: #error "sysctl 
system call is unsupported in x32 kernel"
   # error "sysctl system call is unsupported in x32 kernel"

This use of sysctl is apparently intended to be a feature:

  2014-04-19

  Add rand.stir, which tries to be more robust than OpenSSL's default
  RAND_poll implementation, which isn't chroot- or RLIMIT_NOFILE-safe
  because it requires opening /dev/urandom. In particular, it will use
  sysctl-based randomness sources on Linux and the BSDs (excluding OS X).

However, per https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827881#10,
sysctl is deprecated in general and unavailable altogether on x32.

Could you please take a look?

Thanks!

--- End Message ---
--- Begin Message ---
Source: lua-openssl
Source-Version: 20151221-3

We believe that the bug you reported is fixed in the latest version of
lua-openssl, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ondřej Surý <[email protected]> (supplier of updated lua-openssl package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 30 Aug 2016 09:55:31 +0200
Source: lua-openssl
Binary: lua-openssl lua-openssl-dev
Architecture: source
Version: 20151221-3
Distribution: unstable
Urgency: medium
Maintainer: Ondřej Surý <[email protected]>
Changed-By: Ondřej Surý <[email protected]>
Description:
 lua-openssl - event loop for Lua
 lua-openssl-dev - event loop for Lua (development package)
Closes: 831333
Changes:
 lua-openssl (20151221-3) unstable; urgency=medium
 .
   * Use arc4random()/getrandom() to get random bytes instead of sysctl()
     interface (Closes: #831333)
Checksums-Sha1:
 6b0eb19007f24b980d6eaca6c910c1ac7a332f2d 2119 lua-openssl_20151221-3.dsc
 e3105db407d0ccf2a41cedf51d4587ade32bd469 3592 
lua-openssl_20151221-3.debian.tar.xz
Checksums-Sha256:
 882bc161e11dc2a2a620123c8ae0b3c241b523f7272a484af2784d333605c3c7 2119 
lua-openssl_20151221-3.dsc
 069bcfcc24988ca84b9461105d62795c775e688e958ccedfa742542ad6333f3c 3592 
lua-openssl_20151221-3.debian.tar.xz
Files:
 09f710ec7aa047518041fa7bf47c7a74 2119 interpreters optional 
lua-openssl_20151221-3.dsc
 ae627e48c2123815926aeb936632476c 3592 interpreters optional 
lua-openssl_20151221-3.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=acba
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to