Comment 7 for bug 1961901

Revision history for this message
Miriam EspaƱa Acebal (mirespace) wrote (last edit ): Re: 3.6.2-1 FTBFS in Jammy on x86/s390x

Hi!

I made several buildings in a ppa (arm64,s 390x and proposed pocket) here [1], with three scenarios:

1) the optimization moutline-atomics (sorry for the misunderstanding) plus disabling Bsymbolic-functions -> doesn't work
2) only disabling Bsymbolic-functions (in a bad attempt to restrict the disabling of lto for arm64 and s390x... but, happy that this can confirm scenario 3 :) ) -> doesn't work
3) disabling lto and Bsymbolic-functions -> it works.

Therefore, what works for arm64 building is disabling lto. I'll add the package to the lto-disabled-list package for this (adding a related task here).

Continue checking what is happening on the decryption testsuite. We can see in the log the following:

FAIL: test_80211_wpa2_ft_eap (suite_decryption.case_decrypt_80211)
IEEE 802.11 decode WPA2 FT EAP
----------------------------------------------------------------------
Traceback (most recent call last):
  File "/<<PKGBUILDDIR>>/test/fixtures.py", line 54, in wrapped
    test_fn(self, *fixtures)
  File "/<<PKGBUILDDIR>>/test/suite_decryption.py", line 271, in test_80211_wpa2_ft_eap
    self.assertTrue(self.grepOutput('Who has 192.168.1.1')) # Verifies GTK decryption
AssertionError: False is not true

======================================================================
FAIL: test_80211_wpa2_ft_psk_no_roam (suite_decryption.case_decrypt_80211)
IEEE 802.11 decode WPA2 FT PSK (without roam verification)
----------------------------------------------------------------------
Traceback (most recent call last):
  File "/<<PKGBUILDDIR>>/test/fixtures.py", line 54, in wrapped
    test_fn(self, *fixtures)
  File "/<<PKGBUILDDIR>>/test/suite_decryption.py", line 235, in test_80211_wpa2_ft_psk_no_roam
    self.assertEqual(self.countOutput('DHCP Discover'), 2)
AssertionError: 0 != 2

======================================================================
FAIL: test_80211_wpa2_ft_psk_roam (suite_decryption.case_decrypt_80211)
IEEE 802.11 decode WPA2 FT PSK
----------------------------------------------------------------------
Traceback (most recent call last):
  File "/<<PKGBUILDDIR>>/test/fixtures.py", line 54, in wrapped
    test_fn(self, *fixtures)
  File "/<<PKGBUILDDIR>>/test/suite_decryption.py", line 255, in test_80211_wpa2_ft_psk_roam
    self.assertEqual(self.countOutput('DHCP Discover'), 2)
AssertionError: 0 != 2

[1] https://launchpad.net/~mirespace/+archive/ubuntu/wireshark-arm64-jammy/+builds?build_text=&build_state=all