Your message dated Tue, 01 Oct 2024 22:35:31 +0000
with message-id <[email protected]>
and subject line Bug#1083086: fixed in nss 2:3.105-1
has caused the Debian Bug report #1083086,
regarding nss FTBFS on 32bit arm userland and 64bit kernel
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1083086: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1083086
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: nss
Version: 2:3.103-1
Severity: important
Tags: ftbfs patch
Control: clone -1 -2
Control: reassign -2 src:nss-pem
Control: clone 948523 -3
Control: reassign -3 src:nss-pem
Control: clone -1 -4
Control: retitle -4 nss-pem: unregistered vendor copy of nss
Control: tags -4 =
Control: reassign -4 src:nss-pem
Hi,
nss and nss-pem FTBFS on the reproducible builds infrastructure for
armhf. For nss-pem, it was the second build that FTBFS. That got me
looking and allowed me identifying the cause. It looks at the uname and
when you build on an arm32 userland with a 64bit kernel, some features
are detected differently (as it looks at uname -m) and then the build
fails.
We already pass OS_TEST for cross building where uname -m is a problem,
so I suggest extending this to cover the arm case and overriding OS_TEST
even for native builds. I'm attaching a patch for your convenience.
As this bug also affects nss-pem, I am cloning the bug (as -2) for
nss-pem and also cloning another bug (as -3) where nss-pem FTCBFS for
ppc64el.
I also observe that the vendoring of nss-pem is not registered in the
security tracker
https://salsa.debian.org/security-tracker-team/security-tracker/-/blob/master/data/embedded-code-copies.
Please unvendor nss from nss-pem or register your copy. This matter is
tracked as bug -4.
Helmut
--- nss-b/debian/rules
+++ nss-a/debian/rules
@@ -47,6 +47,11 @@
endif
TOOLCHAIN += OS_TEST=$(DEB_HOST_GNU_CPU)
TOOLCHAIN += KERNEL=$(DEB_HOST_ARCH_OS)
+else
+# Avoid misdetecting armhf as arm64 when built on a 64bit kernel.
+ifeq ($(DEB_HOST_GNU_CPU),arm)
+TOOLCHAIN += OS_TEST=arm
+endif
endif
# $(foreach foo,$(list),$(call cmd,some command $(foo))) expands to
--- End Message ---
--- Begin Message ---
Source: nss
Source-Version: 2:3.105-1
Done: Mike Hommey <[email protected]>
We believe that the bug you reported is fixed in the latest version of
nss, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Mike Hommey <[email protected]> (supplier of updated nss package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 02 Oct 2024 07:06:03 +0900
Source: nss
Architecture: source
Version: 2:3.105-1
Distribution: unstable
Urgency: medium
Maintainer: Maintainers of Mozilla-related packages
<[email protected]>
Changed-By: Mike Hommey <[email protected]>
Closes: 1083086
Changes:
nss (2:3.105-1) unstable; urgency=medium
.
* New upstream release.
* debian/rules: Override OS_TEST and KERNEL even when not cross-compiling.
Closes: #1083086
Checksums-Sha1:
4a104a542018d71c29c60cb792224b6f3ec53bb1 2192 nss_3.105-1.dsc
7b6de991213a6fa839c575f38f454ae3b475e911 76620664 nss_3.105.orig.tar.gz
75b54f1a5d15db50ea8cd755b5cda952b5137b27 19428 nss_3.105-1.debian.tar.xz
b9e81bb05621d7080ff64657baf33158778d30bd 6845 nss_3.105-1_source.buildinfo
Checksums-Sha256:
9963f00a67b7cbc485fcec0fd145d4b7596632023e124827550697350e352da6 2192
nss_3.105-1.dsc
8e8e4c8c88ca5c828b207cfaf66c6188e7f96c97cc18946d3db7da4c0d395619 76620664
nss_3.105.orig.tar.gz
76128727fb0ff90c0280af5dd8564e9ec3780160e3b3e3879cea3aefc60dc9b9 19428
nss_3.105-1.debian.tar.xz
2c1909301a4ad81c1a57c4d8a039902bb8c8693283ca4dc3a1e36c33bf99fd13 6845
nss_3.105-1_source.buildinfo
Files:
a2886ba97f15a83fb4c2f294866ba96c 2192 libs optional nss_3.105-1.dsc
1657133aebd0f844ffe6556398ff1907 76620664 libs optional nss_3.105.orig.tar.gz
93edea70e95d80cc6bc302d5a91fcfcd 19428 libs optional nss_3.105-1.debian.tar.xz
e5f4c0fbd6fcbb3bb6179437a91d2dc7 6845 libs optional
nss_3.105-1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=lEAQ
-----END PGP SIGNATURE-----
pgplgjhOtOIZQ.pgp
Description: PGP signature
--- End Message ---