Your message dated Fri, 25 Aug 2023 23:29:15 +0200 with message-id <b95d6da5-c9ab-450b-88a2-9cb9d58a8be6@rclobus.nl> and subject line Fixed in bookworm and later has caused the Debian Bug report #1025795, regarding live-build: --memtest option broken with current version of memtest86+ to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 1025795: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1025795 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: live-build: --memtest option broken with current version of memtest86+
- From: Mark Nipper <nipsy@bitgnome.net>
- Date: Fri, 9 Dec 2022 01:42:54 -0800
- Message-id: <Y5MDFjLc6ISAoNLR@arrakis.bitgnome.net>
Package: live-build Version: 1:20220505 Severity: normal Tried using the --memtest memtest86+ option with live-build and ran into an issue where it's looking for the old /boot/memtest86.bin binary inside the chroot, but the current version instead provides the following viable options: --- /boot/memtest86+x32.bin /boot/memtest86+x32.efi /boot/memtest86+x64.bin /boot/memtest86+x64.efi just depending on which architecture and BIOS/UEFI mode you happen to use. It looks like modifying: --- /usr/lib/live/build/binary_memtest shouldn't be too much trouble to provide some additional options to cover at least a couple of those newer choices now. Thanks! -- Package-specific info: -- System Information: Debian Release: bookworm/sid APT prefers testing APT policy: (700, 'testing'), (600, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 6.0.0-5-amd64 (SMP w/16 CPU threads; PREEMPT) Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages live-build depends on: ii debootstrap 1.0.128+nmu2 Versions of packages live-build recommends: ii apt-utils 2.5.4 ii bzip2 1.0.8-5+b1 ii cpio 2.13+dfsg-7.1 ii cryptsetup 2:2.6.0-2 ii file 1:5.41-4 ii live-boot-doc 1:20220505 ii live-config-doc 11.0.3+nmu1 ii live-manual-html [live-manual] 2:20151217.2 ii rsync 3.2.6-4+b1 ii systemd-container 252.2-1 ii wget 1.21.3-1+b2 ii xz-utils 5.2.9-0.0 Versions of packages live-build suggests: ii e2fsprogs 1.46.6~rc1-1+b1 pn mtd-utils <none> ii parted 3.5-3 -- no debconf information -- Mark Nipper
--- End Message ---
--- Begin Message ---
- To: 1025795-done@bugs.debian.org
- Subject: Fixed in bookworm and later
- From: Roland Clobus <rclobus@rclobus.nl>
- Date: Fri, 25 Aug 2023 23:29:15 +0200
- Message-id: <b95d6da5-c9ab-450b-88a2-9cb9d58a8be6@rclobus.nl>
Control: fixed 1025795 1:20230502This bug is fixed in bookworm and later with a different patch, but it works the same for amd64.With kind regards, Roland ClobusAttachment: OpenPGP_signature.asc
Description: OpenPGP digital signature
--- End Message ---