Bug#926539: marked as done (rootskel: steal-ctty no longer works on at least sparc64)

2021-05-03 Thread Debian Bug Tracking System
Your message dated Mon, 3 May 2021 12:47:03 +0200
with message-id <82898247-7c4c-2e2c-358a-5724ce5fc...@physik.fu-berlin.de>
and subject line Re: Bug#926539: Bug#987441: s390x installation bugs
has caused the Debian Bug report #926539,
regarding rootskel: steal-ctty no longer works on at least sparc64
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
926539: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926539
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: rootskel
Version: 1.128
Severity: important
User: debian-sp...@lists.debian.org
Usertags: sparc64

Hello!

I built updated installation images [1] for Debian Ports today and tested
the sparc64 image on our SPARC T5 in an LDOM.

Unfortunately, it seems that the recent changes to rootskel broke the
serial console on sparc64 in d-i. The kernel boots fine but d-i never
starts, the boot stops with:

steal-ctty: No such file or directory

My suspicion is that the support multiple consoles in parallel [2] introduced
this particular regression. I haven't done any debugging yet though as I'm
not sure where to start, I haven't touched the rootskel package before and
therefore would be interested in any pointers how to debug this.

Thanks,
Adrian

> [1] https://cdimage.debian.org/cdimage/ports/2019-04-06/
> [2] 
> https://salsa.debian.org/installer-team/rootskel/commit/b6048aafed7d73ba42da04d6f7a798710f271384

--
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer - glaub...@debian.org
`. `'   Freie Universitaet Berlin - glaub...@physik.fu-berlin.de
  `-GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913
--- End Message ---
--- Begin Message ---
Hi!

On 5/3/21 12:21 PM, Valentin Vidic wrote:
>>> I'd suggest at least retitling the bug report to mention s390x (release
>>> arch, affected) instead of sparc64 (port arch, no longer affected), to
>>> lower the chances people could overlook this issue, thinking it's only
>>> about a port arch.
>>
>> We could also unmerge #926539 and #961056 again, then close the former bug
>> which was sparc64-specific.
> 
> I have unmerged the bugs now, so the sparc one can be closed.

Alright, done.

Thanks,
Adrian

-- 
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer - glaub...@debian.org
`. `'   Freie Universitaet Berlin - glaub...@physik.fu-berlin.de
  `-GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913--- End Message ---


Bug#926539: marked as done (rootskel: steal-ctty no longer works on at least sparc64)

2020-03-28 Thread Debian Bug Tracking System
Your message dated Sat, 28 Mar 2020 18:16:42 +0100
with message-id <244c123a-be6d-6dff-383d-1560cdfd0...@physik.fu-berlin.de>
and subject line Re: Bug#926539: rootskel: steal-ctty no longer works on at 
least sparc64
has caused the Debian Bug report #926539,
regarding rootskel: steal-ctty no longer works on at least sparc64
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
926539: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926539
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: rootskel
Version: 1.128
Severity: important
User: debian-sp...@lists.debian.org
Usertags: sparc64

Hello!

I built updated installation images [1] for Debian Ports today and tested
the sparc64 image on our SPARC T5 in an LDOM.

Unfortunately, it seems that the recent changes to rootskel broke the
serial console on sparc64 in d-i. The kernel boots fine but d-i never
starts, the boot stops with:

steal-ctty: No such file or directory

My suspicion is that the support multiple consoles in parallel [2] introduced
this particular regression. I haven't done any debugging yet though as I'm
not sure where to start, I haven't touched the rootskel package before and
therefore would be interested in any pointers how to debug this.

Thanks,
Adrian

> [1] https://cdimage.debian.org/cdimage/ports/2019-04-06/
> [2] 
> https://salsa.debian.org/installer-team/rootskel/commit/b6048aafed7d73ba42da04d6f7a798710f271384

--
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer - glaub...@debian.org
`. `'   Freie Universitaet Berlin - glaub...@physik.fu-berlin.de
  `-GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913
--- End Message ---
--- Begin Message ---
Hi!

On 3/28/20 5:39 PM, Ivo De Decker wrote:
> This bug wasn't fixed in time for buster. Is it still present in bullseye? If
> so, it might be good to try to fix it this time.

I fixed the bug upstream [1], so we can safely close the issue here.

Adrian

> [1] 
> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=07a6d63eb1b54b5fb38092780fe618dfe1d96e23

-- 
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer - glaub...@debian.org
`. `'   Freie Universitaet Berlin - glaub...@physik.fu-berlin.de
  `-GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913--- End Message ---


Bug#926539: marked as done (rootskel: steal-ctty no longer works on at least sparc64)

2019-06-19 Thread Debian Bug Tracking System
Your message dated Thu, 20 Jun 2019 00:36:19 +
with message-id 
and subject line Bug#926539: fixed in linux 4.19.37-5
has caused the Debian Bug report #926539,
regarding rootskel: steal-ctty no longer works on at least sparc64
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
926539: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926539
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: rootskel
Version: 1.128
Severity: important
User: debian-sp...@lists.debian.org
Usertags: sparc64

Hello!

I built updated installation images [1] for Debian Ports today and tested
the sparc64 image on our SPARC T5 in an LDOM.

Unfortunately, it seems that the recent changes to rootskel broke the
serial console on sparc64 in d-i. The kernel boots fine but d-i never
starts, the boot stops with:

steal-ctty: No such file or directory

My suspicion is that the support multiple consoles in parallel [2] introduced
this particular regression. I haven't done any debugging yet though as I'm
not sure where to start, I haven't touched the rootskel package before and
therefore would be interested in any pointers how to debug this.

Thanks,
Adrian

> [1] https://cdimage.debian.org/cdimage/ports/2019-04-06/
> [2] 
> https://salsa.debian.org/installer-team/rootskel/commit/b6048aafed7d73ba42da04d6f7a798710f271384

--
 .''`.  John Paul Adrian Glaubitz
: :' :  Debian Developer - glaub...@debian.org
`. `'   Freie Universitaet Berlin - glaub...@physik.fu-berlin.de
  `-GPG: 62FF 8A75 84E0 2956 9546  0006 7426 3B37 F5B5 F913
--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 4.19.37-5

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 926...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ben Hutchings  (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

Format: 1.8
Date: Wed, 19 Jun 2019 23:16:58 +0100
Source: linux
Architecture: source
Version: 4.19.37-5
Distribution: unstable
Urgency: medium
Maintainer: Debian Kernel Team 
Changed-By: Ben Hutchings 
Closes: 926539 930743
Changes:
 linux (4.19.37-5) unstable; urgency=medium
 .
   [ Romain Perier ]
   * [sparc64] Fix device naming inconsistency between sunhv_console and
 sunhv_reg (Closes: #926539)
 .
   [ Ben Hutchings ]
   * tcp: Avoid ABI change for DoS fixes (Closes: #930743)
   * Add ABI reference for 4.19.0-5
Checksums-Sha1:
 553db42bef4633b7ca929e9b336bbabd21b34504 189124 linux_4.19.37-5.dsc
 dee856cd02b146cf2d930f80c21e12a463c15577 4255088 linux_4.19.37-5.debian.tar.xz
 801e3d99cd42b2f445e948acac43815b6e1e94a7 47317 linux_4.19.37-5_source.buildinfo
Checksums-Sha256:
 c09624619d9808aae877a7fc638f259181d9f9dc53aee789ecbe82a0ed3498eb 189124 
linux_4.19.37-5.dsc
 5a292f47187414902c906088312b35d320ceeafb9a901ad779e1d6fea5d31b0d 4255088 
linux_4.19.37-5.debian.tar.xz
 cd895cc6f4abb1c9ebe6bd4dea9ae022826ce7672a56e15588abbbf732b7343c 47317 
linux_4.19.37-5_source.buildinfo
Files:
 6effcd246c4e06fbfcc2a93d6d0cea0b 189124 kernel optional linux_4.19.37-5.dsc
 b684b0c52f7bc7477b1ac054e25e1885 4255088 kernel optional 
linux_4.19.37-5.debian.tar.xz
 ff96135cf7fd8017e597ab08341d69d4 47317 kernel optional 
linux_4.19.37-5_source.buildinfo

-BEGIN PGP SIGNATURE-

iQIzBAEBCgAdFiEErCspvTSmr92z9o8157/I7JWGEQkFAl0K0ZoACgkQ57/I7JWG
EQmYvg/+P71WYzYL+OGxriiAPHL9SLAM1t0zb/xjme4RNN967raC11liHTY/TrSl
1PaaI41laRXaobSwOPp11vL0ImRlRqr3XXWPcjBVTeOtaRAOGb4p6uGaH3MNK0m7
NgahWmH4ZwKxncciYVLZjjpgt1h3QVO8+xispaQlHaG+x5X/MX9woN9ZOt31KQOP
+ME71SzERkS8XYs+fc31XyjQYi8ushcbrZru9mm2wtK008wWX4UFWD6HZIOf2NaZ
hYGmKe5/VtyHK9GbG2nzBx9qVe47KEsFOHFMN47yWzxJcJrhsV6k2mn4+h921myJ
wvlaqWHZW6QEA3qn1hazu+3zA0BfnxNHHzaLjcyeiNUVZ4beBUHDjvBItl0oYwMn
ZUGfTXqfXsCOJ0EXdb0J9K3Da9McegWPM/J2D3Ko/XcTV2meVEeFhiD7nUR/JbCm
9NRcffW+swGV2DBt2u27lwYswa4ZyDHcd8vtePP4IcApBgFBqu0Dx94niRiKcV78
dletH3v/aL+8PAT1KdxOqj086I2vN9t1jCQ2+dHMTT6oIQ0nXdqdT1EUzuUpr6ch
rnHtRHI6ezA2I5IEC78PYancq7Z7kEUaTlyvNlMA2veLiMokngntOD6GTYld+xoJ
DQ5cXuj9rTentpx8IChzJcKiyDTXvFFbNtdxrdm9jIvOMboDKl0=
=iVca
-END PGP SIGNATURE End