Your message dated Tue, 30 Aug 2016 10:23:38 +0000 with message-id <[email protected]> and subject line Bug#831333: fixed in lua-openssl 20151221-3 has caused the Debian Bug report #831333, regarding lua-openssl: FTBFS on x32: sysctl system call is unsupported to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact [email protected] immediately.) -- 831333: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=831333 Debian Bug Tracking System Contact [email protected] with problems
--- Begin Message ---Source: lua-openssl Version: 20151221-2 Severity: important Justification: fails to build from source Hi, Ondřej. As you may have noticed, the x32 build of lua-openssl failed: In file included from /usr/include/x86_64-linux-gnux32/sys/sysctl.h:63:0, from src/openssl.c:6987: /usr/include/x86_64-linux-gnux32/bits/sysctl.h: At top level: /usr/include/x86_64-linux-gnux32/bits/sysctl.h:19:3: error: #error "sysctl system call is unsupported in x32 kernel" # error "sysctl system call is unsupported in x32 kernel" This use of sysctl is apparently intended to be a feature: 2014-04-19 Add rand.stir, which tries to be more robust than OpenSSL's default RAND_poll implementation, which isn't chroot- or RLIMIT_NOFILE-safe because it requires opening /dev/urandom. In particular, it will use sysctl-based randomness sources on Linux and the BSDs (excluding OS X). However, per https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827881#10, sysctl is deprecated in general and unavailable altogether on x32. Could you please take a look? Thanks!
--- End Message ---
--- Begin Message ---Source: lua-openssl Source-Version: 20151221-3 We believe that the bug you reported is fixed in the latest version of lua-openssl, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [email protected], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Ondřej Surý <[email protected]> (supplier of updated lua-openssl package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [email protected]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Tue, 30 Aug 2016 09:55:31 +0200 Source: lua-openssl Binary: lua-openssl lua-openssl-dev Architecture: source Version: 20151221-3 Distribution: unstable Urgency: medium Maintainer: Ondřej Surý <[email protected]> Changed-By: Ondřej Surý <[email protected]> Description: lua-openssl - event loop for Lua lua-openssl-dev - event loop for Lua (development package) Closes: 831333 Changes: lua-openssl (20151221-3) unstable; urgency=medium . * Use arc4random()/getrandom() to get random bytes instead of sysctl() interface (Closes: #831333) Checksums-Sha1: 6b0eb19007f24b980d6eaca6c910c1ac7a332f2d 2119 lua-openssl_20151221-3.dsc e3105db407d0ccf2a41cedf51d4587ade32bd469 3592 lua-openssl_20151221-3.debian.tar.xz Checksums-Sha256: 882bc161e11dc2a2a620123c8ae0b3c241b523f7272a484af2784d333605c3c7 2119 lua-openssl_20151221-3.dsc 069bcfcc24988ca84b9461105d62795c775e688e958ccedfa742542ad6333f3c 3592 lua-openssl_20151221-3.debian.tar.xz Files: 09f710ec7aa047518041fa7bf47c7a74 2119 interpreters optional lua-openssl_20151221-3.dsc ae627e48c2123815926aeb936632476c 3592 interpreters optional lua-openssl_20151221-3.debian.tar.xz -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQJ8BAEBCgBmBQJXxVECXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQzMEI5MzNEODBGQ0UzRDk4MUEyRDM4RkIw Qzk5QjcwRUY0RkNCQjA3AAoJEAyZtw70/LsH8vAQAMkAnLZY+14ZKkIbASCEVKZD LyYu5HlHnyjb3tjtrP+6d1rTvYC7E3kpTRJukO5wwz0IqT3CFzMV9dZr5pBzd7qG JRGt7I1b1ZFjClQjzeCSCggQK4Jvo7z+AKA4hFFvUOxXBN2vKAOMGM8KeVgZo0FO lG+8Hgt36J4bBnXOJW0g2wrso24nssVFs4/bE5UKMPG+nReZksApXmia69nT3VVP 6J60uUJsxbuz/UnnbZvpFxuxF0ZoyTf+86G6f1u0vGO0wzbKjXc6cd3HeGuO8WjN sR7PZN/qxfNlTLpY7bANOiBT530wcrI9fPlUsttYm6XjFOtXGpPtTCUL6fzGAmCB OY+nCsPhQljKriEunj4WGFQo0d7tf7w7uadOmtCvUebS630/ghsYRUyVDtm4UoGq BAOUcrO0xKUQwoPsg4y+5lP3LWq0FByYanjeA03qGf9iWxwzoGBMpm19UeliGSN3 1SvGG8WnrZ6o3JXdnbfONt7W8rX/nvWnI+8CC/iQ8ciKNsKfiQsrbMpW2/Ch1R4b SW74WtAz94KA1XiBRZKsDwnD9qk2MnEJhLYaPQhNoqMbLs84bJegJwNh4aEJxBLR +P6rVCWXU6n80SGwi82UeHQ+0dm922QLBNLlZ9HLayDV3nVwsUVS1JLovoEUMy+6 uCq53lQwhoWsc4ZNQWrQ =acba -----END PGP SIGNATURE-----
--- End Message ---

