Esa Peuha | 4 Feb 19:53 2016
Picon

Bug#813727: kfreebsd-10: update clang version

Source: kfreebsd-10
Control: block 812778 by -1

Currently freebsd-10 build-depends on clang-3.5 which is going to be
removed (see bug #812778), so please update to a newer version.

Steven Chamberlain | 3 Feb 16:00 2016

Bug#813598: gnutls28: FTBFS[kfreebsd]: tests/mini-loss-time race

Package: gnutls28
Version: 3.4.8-3
Severity: important

Hi,

gnutls28 tests/mini-loss-time fails about 20% of the time when I try it
on kfreebsd-amd64.  I think probably introduced by this commit:
https://gitlab.com/gnutls/gnutls/commit/e2a3ad31c487cbce997a08dddc55db639b60c024

The failure happens at ~60 seconds elapsed, when some (expected) timeout
is reached.  The child always exits first, and closes fds:

(49946 101730 = child)
49946 101730 mini-loss-time 60.187211 CALL  close(0x4)                      
49946 101730 mini-loss-time 60.187244 RET   close 0                         
49946 101730 mini-loss-time 60.187346 CALL  close(0x3)                      
49946 101730 mini-loss-time 60.187363 RET   close 0                         
49946 101730 mini-loss-time 60.187830 CALL  exit(0)                         

The parent receives SIGCHLD, and some wait() call on the child pid
returns:

(49871 102302 = parent)
49871 102302 mini-loss-time 60.188448 RET   select -1 errno 4 Interrupted system call
49871 102302 mini-loss-time 60.188572 PSIG  SIGCHLD caught handler=0x401570 mask=0x0 code=CLD_EXITED
49871 102302 mini-loss-time 60.188594 CALL  wait4(0xffffffff,0x7fffffffdd44,0,0)
49871 102302 mini-loss-time 60.188657 RET   wait4 49946/0xc31a              
49871 102302 mini-loss-time 60.188673 CALL  sigreturn(0x7fffffffdd70)       
49871 102302 mini-loss-time 60.188689 RET   sigreturn JUSTRETURN            
(Continue reading)

Christian Perrier | 27 Jan 13:49 2016
Picon
Gravatar

Accepted partman-zfs 49 (source kfreebsd-i386) into unstable


Format: 1.8
Date: Wed, 27 Jan 2016 12:25:40 +0100
Source: partman-zfs
Binary: partman-zfs
Architecture: source kfreebsd-i386
Version: 49
Distribution: unstable
Urgency: medium
Maintainer: Debian Install System Team <debian-boot <at> lists.debian.org>
Changed-By: Christian Perrier <bubulle <at> debian.org>
Description:
 partman-zfs - Add to partman support for ZFS (udeb)
Changes:
 partman-zfs (49) unstable; urgency=medium
 .
   [ Updated translations ]
   * Swedish (sv.po) by Martin Bagge / brother
Checksums-Sha1:
 9ff5201860e8c6937790496c84fb8dbab97d0ed1 1693 partman-zfs_49.dsc
 dc28e20cc870db8f01066fedfc187a2e9cec317d 260732 partman-zfs_49.tar.xz
 bc9b17bca2e97f78d725416736dcbd6a169f459e 286974 partman-zfs_49_kfreebsd-i386.udeb
Checksums-Sha256:
 98bd37f1b2bd0ea57879dc4eb025628f033dcff19103192eff195f7d7b70631e 1693 partman-zfs_49.dsc
 34cb0f59f1383bb02d68f996a7fc244b3fd751f04e05a5f97775156c8c443e8a 260732 partman-zfs_49.tar.xz
 9172b0895d5723d1036dffb2414e00276310891760c13dac808cb2d42eda74ec 286974 partman-zfs_49_kfreebsd-i386.udeb
Files:
 36cb84e11409215b359d3eb8bffb2830 1693 debian-installer standard partman-zfs_49.dsc
 913e211f942cbf68209b8dc062cd8842 260732 debian-installer standard partman-zfs_49.tar.xz
 e757ccb23b17b353c7468b0c237f1dba 286974 debian-installer standard partman-zfs_49_kfreebsd-i386.udeb
(Continue reading)

John Paul Adrian Glaubitz | 25 Jan 11:14 2016
Picon
Picon

New ports signing key for 2016

Hello!

I just noticed there is a new signing key for debian-ports, please
update your buildds:

glaubitz <at> z6:~/m68k> gpg --fingerprint B4C86482705A2CE1
pub   4096R/705A2CE1 2016-01-24 [expires: 2017-02-01]
      Key fingerprint = 69DD B056 0EA8 6E87 E835  99B3 B4C8 6482 705A 2CE1
uid                  Debian Ports Archive Automatic Signing Key (2016)
<ftpmaster <at> debian-ports.org>

glaubitz <at> z6:~/m68k>

Adrian

Picon

kfreebsd-10 is marked for autoremoval from testing

kfreebsd-10 10.1~svn274115-10 is marked for autoremoval from testing on 2016-02-15

It is affected by these RC bugs:
811277: kfreebsd-10: CVE-2016-1879: SCTP ICMPv6 error message vulnerability [SA-16:01]
811280: kfreebsd-10: CVE-2016-1882: TCP MD5 signature denial of service [SA-16:05]
811278: kfreebsd-10: CVE-2016-1880: Linux compatibility layer incorrect futex handling [SA-16:03]
811279: kfreebsd-10: CVE-2016-1881: Linux compatibility layer setgroups(2) system call
vulnerability [SA-16:04]

John Paul Adrian Glaubitz | 19 Jan 20:57 2016
Picon
Picon

Bug#811554: haskell-hslua: Please don't build-depend on libluajit-5.1-dev for unsupported architectures

Source: haskell-hslua
Version: 0.4.1-4
Severity: important

Hello!

Currently, haskell-hslua is BD-Uninstallable for multiple architectures were it would
actually build if it wasn't for the build dependency on libluajit-5.1-dev which is
only supported on a limited number of architectures.

I would therefore suggest to change the build dependency on libluajit-5.1-dev to use
a whitelist instead of a blacklist, i.e. change debian/control as below:

--- control.old	    2016-01-19 20:48:43.000000000 +0100
+++ control.new	    2016-01-19 20:50:18.661062876 +0100
 <at>  <at>  -10,7 +10,7  <at>  <at> 
  ghc-prof,
  pkg-config,
  liblua5.1-0-dev,
- libluajit-5.1-dev [!arm64 !ppc64el !s390x],
+ libluajit-5.1-dev [amd64 armel armhf i386 mips mipsel powerpc hurd-i386 kfreebsd-i386],
  libghc-hspec-dev,
  libghc-hspec-contrib-dev,
  libghc-hunit-dev,

This would fix haskell-hslua being BD-Uninstallable on most ports architectures.

Thanks,
Adrian

(Continue reading)

Debian FTP Masters | 19 Jan 02:34 2016
Picon

kfreebsd-10_10.1~svn274115-4+kbsd8u2_multi.changes ACCEPTED into stable-kfreebsd-proposed-updates

Mapping jessie-kfreebsd to stable-kfreebsd.
Mapping stable-kfreebsd to stable-kfreebsd-proposed-updates.

Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 18 Jan 2016 02:35:16 +0000
Source: kfreebsd-10
Binary: kfreebsd-source-10.1 kfreebsd-headers-10.1-0 kfreebsd-image-10.1-0-amd64
kfreebsd-image-10-amd64 kfreebsd-headers-10.1-0-amd64 kfreebsd-headers-10-amd64
kernel-image-10.1-0-amd64-di nic-modules-10.1-0-amd64-di
nic-wireless-modules-10.1-0-amd64-di nic-shared-modules-10.1-0-amd64-di
serial-modules-10.1-0-amd64-di usb-serial-modules-10.1-0-amd64-di
ppp-modules-10.1-0-amd64-di cdrom-modules-10.1-0-amd64-di scsi-core-modules-10.1-0-amd64-di
scsi-modules-10.1-0-amd64-di scsi-extra-modules-10.1-0-amd64-di
plip-modules-10.1-0-amd64-di floppy-modules-10.1-0-amd64-di loop-modules-10.1-0-amd64-di
ipv6-modules-10.1-0-amd64-di nls-core-modules-10.1-0-amd64-di ext2-modules-10.1-0-amd64-di
isofs-modules-10.1-0-amd64-di reiserfs-modules-10.1-0-amd64-di fat-modules-10.1-0-amd64-di
zfs-modules-10.1-0-amd64-di nfs-modules-10.1-0-amd64-di nullfs-modules-10.1-0-amd64-di
md-modules-10.1-0-amd64-di parport-modules-10.1-0-amd64-di nic-usb-modules-10.1-0-amd64-di
 sata-modules-10.1-0-amd64-di acpi-modules-10.1-0-amd64-di i2c-modules-10.1-0-amd64-di
crypto-modules-10.1-0-amd64-di crypto-dm-modules-10.1-0-amd64-di
mmc-core-modules-10.1-0-amd64-di mmc-modules-10.1-0-amd64-di sound-modules-10.1-0-amd64-di
zlib-modules-10.1-0-amd64-di kfreebsd-image-10.1-0-486 kfreebsd-image-10-486
kfreebsd-headers-10.1-0-486 kfreebsd-headers-10-486 kfreebsd-image-10.1-0-686
kfreebsd-image-10-686 kfreebsd-headers-10.1-0-686 kfreebsd-headers-10-686
kfreebsd-image-10.1-0-xen kfreebsd-image-10-xen kfreebsd-headers-10.1-0-xen
(Continue reading)

Debian FTP Masters | 19 Jan 02:22 2016
Picon

Processing of kfreebsd-10_10.1~svn274115-4+kbsd8u2_multi.changes

kfreebsd-10_10.1~svn274115-4+kbsd8u2_multi.changes uploaded successfully to localhost
along with the files:
  kfreebsd-10_10.1~svn274115-4+kbsd8u2.dsc
  kfreebsd-10_10.1~svn274115-4+kbsd8u2.debian.tar.xz
  kfreebsd-source-10.1_10.1~svn274115-4+kbsd8u2_all.deb

Greetings,

	Your Debian queue daemon (running on host franck.debian.org)

Debian FTP Masters | 19 Jan 02:20 2016
Picon

Processing of kfreebsd-10_10.1~svn274115-4+kbsd8u2_multi.changes

kfreebsd-10_10.1~svn274115-4+kbsd8u2_multi.changes uploaded successfully to ftp-master.debian.org
along with the files:
  kfreebsd-10_10.1~svn274115-4+kbsd8u2.dsc
  kfreebsd-10_10.1~svn274115-4+kbsd8u2.debian.tar.xz
  kfreebsd-source-10.1_10.1~svn274115-4+kbsd8u2_all.deb

Greetings,

	Your Debian queue daemon (running on host coccia.debian.org)

Debian Bug Tracking System | 18 Jan 03:51 2016
Picon

Processed: Re: Bug#811281: kfreebsd-10: filemon and bmake meta-mode stability issues [EN-16:01]

Processing commands for control <at> bugs.debian.org:

> notfound 811281 kfreebsd-10/10.1~svn274115-4+kbsd8u1
Bug #811281 {Done: Steven Chamberlain <steven <at> pyro.eu.org>} [src:kfreebsd-10] kfreebsd-10: filemon
and bmake meta-mode stability issues [EN-16:01]
No longer marked as found in versions kfreebsd-10/10.1~svn274115-4+kbsd8u1.
> notfound 811281 kfreebsd-10/10.1~svn274115-10
Bug #811281 {Done: Steven Chamberlain <steven <at> pyro.eu.org>} [src:kfreebsd-10] kfreebsd-10: filemon
and bmake meta-mode stability issues [EN-16:01]
No longer marked as found in versions kfreebsd-10/10.1~svn274115-10.
> thanks
Stopping processing here.

Please contact me if you need assistance.
--

-- 
811281: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=811281
Debian Bug Tracking System
Contact owner <at> bugs.debian.org with problems

Steven Chamberlain | 17 Jan 22:42 2016

Bug#811315: getdns: FTBFS[kfreebsd]: needs getentropy implementation

Package: getdns
Version: 0.9.0-1
Severity: normal
Tags: patch

Hi,

getdns FTBFS on kfreebsd because it lacks a getentropy implementation
for the FreeBSD kernel.  But there is one already in LibreSSL Portable
we can use, and works fine here.

Please find patch attached.  Thanks!

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: kfreebsd-amd64 (x86_64)

Kernel: kFreeBSD 10.1-0-amd64
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Attachment (kfreebsd.diff): text/x-diff, 2546 bytes

Gmane