[Bug 1961901] Re: 3.6.2-1 FTBFS in Jammy on x86/s390x
Miriam EspaƱa Acebal
1961901 at bugs.launchpad.net
Thu Feb 24 11:59:57 UTC 2022
Hi!
I made several buildings in a ppa (arm64,s 390x and proposed pocket)
here [1], with three scenarios:
1) the optimization moutline-atomics (sorry for the misunderstanding) plus disabling Bsymbolic-functions -> doesn't work
2) only disabling Bsymbolic-functions (in a bad attempt to restrict the disabling of lto for arm64 and s390x... but, happy that this can confirm scenario 3 :) ) -> doesn't work
3) disabling lto and Bsymbolic-functions -> it works.
Therefore, what works for arm64 building is disabling lto. I'll add the
package to the lto-disabled-list package for this (adding a related task
here).
Continue checking what is happening on the decryption testsuite. We can
see in the log the following:
FAIL: test_80211_wpa2_ft_eap (suite_decryption.case_decrypt_80211)
IEEE 802.11 decode WPA2 FT EAP
----------------------------------------------------------------------
Traceback (most recent call last):
File "/<<PKGBUILDDIR>>/test/fixtures.py", line 54, in wrapped
test_fn(self, *fixtures)
File "/<<PKGBUILDDIR>>/test/suite_decryption.py", line 271, in test_80211_wpa2_ft_eap
self.assertTrue(self.grepOutput('Who has 192.168.1.1')) # Verifies GTK decryption
AssertionError: False is not true
======================================================================
FAIL: test_80211_wpa2_ft_psk_no_roam (suite_decryption.case_decrypt_80211)
IEEE 802.11 decode WPA2 FT PSK (without roam verification)
----------------------------------------------------------------------
Traceback (most recent call last):
File "/<<PKGBUILDDIR>>/test/fixtures.py", line 54, in wrapped
test_fn(self, *fixtures)
File "/<<PKGBUILDDIR>>/test/suite_decryption.py", line 235, in test_80211_wpa2_ft_psk_no_roam
self.assertEqual(self.countOutput('DHCP Discover'), 2)
AssertionError: 0 != 2
======================================================================
FAIL: test_80211_wpa2_ft_psk_roam (suite_decryption.case_decrypt_80211)
IEEE 802.11 decode WPA2 FT PSK
----------------------------------------------------------------------
Traceback (most recent call last):
File "/<<PKGBUILDDIR>>/test/fixtures.py", line 54, in wrapped
test_fn(self, *fixtures)
File "/<<PKGBUILDDIR>>/test/suite_decryption.py", line 255, in test_80211_wpa2_ft_psk_roam
self.assertEqual(self.countOutput('DHCP Discover'), 2)
AssertionError: 0 != 2
[1] https://launchpad.net/~mirespace/+archive/ubuntu/wireshark-
arm64-jammy/+builds?build_text=&build_state=all
** Also affects: lto-disabled-list (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to lto-disabled-list in Ubuntu.
https://bugs.launchpad.net/bugs/1961901
Title:
3.6.2-1 FTBFS in Jammy on x86/s390x
Status in lto-disabled-list package in Ubuntu:
New
Status in wireshark package in Ubuntu:
New
Bug description:
https://launchpad.net/ubuntu/+source/wireshark/3.6.2-1
Shows FTBFS on x86 and s390x
https://launchpadlibrarian.net/585664479/buildlog_ubuntu-jammy-arm64.wireshark_3.6.2-1_BUILDING.txt.gz
https://launchpadlibrarian.net/585660058/buildlog_ubuntu-jammy-s390x.wireshark_3.6.2-1_BUILDING.txt.gz
It seems in both cases the unittests fail
37 - suite_unittests (Failed)
And on s390x in addition the decryption test fails
3 - suite_decryption (Failed)
The latter is also true for the same in Debian
https://buildd.debian.org/status/fetch.php?pkg=wireshark&arch=s390x&ver=3.6.2-1&stamp=1644699567&raw=0
This started to interlock with libvirt that now depends on wireshark in excuses and while in universe I think it would be great to have the newer version in Jammy.
But I fail to find the time checking this.
Documenting this as update-excuse bug so others helping can add
insights here...
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lto-disabled-list/+bug/1961901/+subscriptions
More information about the foundations-bugs
mailing list