Your message dated Sat, 29 Aug 2020 15:51:00 +0000
with message-id <[email protected]>
and subject line Bug#954312: fixed in systemd 246.2-2
has caused the Debian Bug report #954312,
regarding Enable seccomp support on riscv64
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
954312: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954312
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: systemd
Version: 245.2-1
Severity: normal
Tags: patch

Dear maintainer,

The latest version of systemd enabled seccomp support on riscv64. Thanks
for doing that. However it now fails to build due to the test
test-seccomp failing:

| 321/486 test-seccomp                            FAIL     0.09 s (killed by 
signal 6 SIGABRT)
| 
| --- command ---
| 08:37:44 
PATH='/<<PKGBUILDDIR>>/build-deb:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games'
 SYSTEMD_KBD_MODEL_MAP='/<<PKGBUILDDIR>>/src/locale/kbd-model-map' 
SYSTEMD_LANGUAGE_FALLBACK_MAP='/<<PKGBUILDDIR>>/src/locale/language-fallback-map'
 /<<PKGBUILDDIR>>/build-deb/test-seccomp
| --- stderr ---
| Failed to read $container of PID 1, ignoring: Permission denied
| Found container virtualization none.
| /* test_seccomp_arch_to_string */
| Assertion 'name' failed at src/test/test-seccomp.c:49, function 
test_seccomp_arch_to_string(). Aborting.
| -------

The full build log is available there:
https://buildd.debian.org/status/fetch.php?pkg=systemd&arch=riscv64&ver=245.2-1&stamp=1584607125&raw=0

It happens that upstream systemd doesn't support yet riscv64. I came
with a very simple patch to fix that issue:

--- systemd-245.2.orig/src/test/test-seccomp.c
+++ systemd-245.2/src/test/test-seccomp.c
@@ -72,6 +72,7 @@ static void test_architecture_table(void
                        "ppc\0"
                        "ppc64\0"
                        "ppc64-le\0"
+                       "riscv64\0"
                        "s390\0"
                        "s390x\0") {
                 uint32_t c;

With this patch, test-seccomp pass successfully and the build succeed.
I have also tested that after installing the resulting seccomp package
the systemd boots and works fine with kernel 5.4 (i.e. without seccomp
support) and kernel 5.5 (i.e. with seccomp support).

Therefore, would it be possible to add this patch in the next upload?

Thanks,
Aurelien

-- Package-specific info:

-- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 5.4.0-3-amd64 (SMP w/4 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=fr_FR.UTF-8, LC_CTYPE=fr_FR.UTF-8 (charmap=UTF-8), LANGUAGE=fr 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
- no debconf information

--- End Message ---
--- Begin Message ---
Source: systemd
Source-Version: 246.2-2
Done: Michael Biebl <[email protected]>

We believe that the bug you reported is fixed in the latest version of
systemd, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Michael Biebl <[email protected]> (supplier of updated systemd package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 29 Aug 2020 16:24:49 +0200
Source: systemd
Architecture: source
Version: 246.2-2
Distribution: unstable
Urgency: medium
Maintainer: Debian systemd Maintainers 
<[email protected]>
Changed-By: Michael Biebl <[email protected]>
Closes: 954312 968589 968612 969006
Changes:
 systemd (246.2-2) unstable; urgency=medium
 .
   [ Balint Reczey ]
   * debian/systemd.postinst: Restart systemd-networkd.socket on incompatible
     change.
     PassCredentials=yes is replaced with PassPacketInfo=yes and extra padding 
is
     dropped, too.
     (Closes: #968589, LP: #1891716)
 .
   [ Michael Biebl ]
   * Fix restart of systemd-networkd.socket.
     We can't restart the socket while systemd-networkd.service is still
     active. Instead we stop the socket and ensure, that a try-restart of
     systemd-networkd.service also starts the socket.
   * seccomp: Add support for riscv64 (Closes: #954312)
   * Support missing conditions/asserts everywhere (Closes: #968612)
   * path: Skip directories when finalising $PATH search (Closes: #969006)
Checksums-Sha1:
 7f41e258b69bd1bd3639668c2d2ef5ccb3fa3dc6 5141 systemd_246.2-2.dsc
 664667c20bfc6443a54d24668c3abbd9df5da459 156780 systemd_246.2-2.debian.tar.xz
 984ce4e138260de1f2f2fdb7d96c2acb0905503b 9310 systemd_246.2-2_source.buildinfo
Checksums-Sha256:
 1793e781da1ae9a780925634bdac740cc6475e542857d8f72e66099e80778e78 5141 
systemd_246.2-2.dsc
 8d271d23880505ee8bfaf0bac7f79570607eb6737230514f01d8f89d92df40cc 156780 
systemd_246.2-2.debian.tar.xz
 737c674ebcfd243762c26931185c1e5311252b86c747416148d84370e30b648d 9310 
systemd_246.2-2_source.buildinfo
Files:
 378a1a78de32550497942e46644955d5 5141 admin optional systemd_246.2-2.dsc
 7be29d57dd9e26fef4d85233c5afb264 156780 admin optional 
systemd_246.2-2.debian.tar.xz
 01d7be574c42af23c07f443e6282ac14 9310 admin optional 
systemd_246.2-2_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=+Ojc
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to