Forums before death by AOL, social media and spammers... "We can't have nice things"
|    linux.debian.bugs.dist    |    Ohh some weird Debian bug report thing    |    28,835 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 28,044 of 28,835    |
|    Vladimir Petko to All    |
|    Bug#1128318: zstd-jni-java: autopkgtest     |
|    18 Feb 26 08:50:01    |
      From: vpa1977@gmail.com              Source: zstd-jni-java       Version: 1.5.2-5+ds-7       Severity: normal              Dear Maintainer,              The autopkgtests fail due to the unexpected native access warning:              utopkgtest [02:22:12]: test ZstdTest: [-----------------------       759s WARNING: A restricted method in java.lang.System has been called       759s WARNING: java.lang.System::loadLibrary has been called by       com.github.luben.zstd.util.Native in an unnamed module       (file:/usr/share/java/zstd-jni-1.5.2-5.jar)       759s WARNING: Use --enable-native-access=ALL-UNNAMED to avoid a warning for       callers in this module       759s WARNING: Restricted methods will be blocked in a future release unless       native access is enabled       759s       760s autopkgtest [02:22:14]: test ZstdTest: -----------------------]       760s autopkgtest [02:22:14]: test ZstdTest: - - - - - - - - - - results - - -       - - - - - - -       760s ZstdTest FAIL stderr: WARNING: A restricted method in       java.lang.System has been called              [1]       https://objectstorage.prodstack5.canonical.com/swift/v1/AUTH_0f9       ae918d5b4744bf7b827671c86842/autopkgtest-       resolute/resolute/arm64/z/zstd-jni-java/20260218_022231_fac87@/log.gz                     -- System Information:       Debian Release: forky/sid        APT prefers questing-updates        APT policy: (500, 'questing-updates'), (500, 'questing-security'), (500,       'questing'), (100, 'questing-backports')       Architecture: amd64 (x86_64)       Foreign Architectures: i386              Kernel: Linux 6.17.0-14-generic (SMP w/32 CPU threads; PREEMPT)       Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE       Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en       Shell: /bin/sh linked to /usr/bin/dash       Init: systemd (via /run/systemd/system)       LSM: AppArmor: enabled              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca