Debian Bug report logs -
#1070444
cxref: arm64 FTBFS with glibc 2.38
Reported by: Graham Inggs <ginggs@debian.org>
Date: Sun, 5 May 2024 13:27:01 UTC
Severity: important
Tags: ftbfs, sid, trixie
Found in version cxref/1.6e-5
Fixed in version cxref/1.6e-6
Done: Camm Maguire <camm@debian.org>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded
to debian-bugs-dist@lists.debian.org, Camm Maguire <camm@debian.org>:
Bug#1070444; Package src:cxref.
(Sun, 05 May 2024 13:27:03 GMT) (full text, mbox, link).
Acknowledgement sent
to Graham Inggs <ginggs@debian.org>:
New Bug report received and forwarded. Copy sent to Camm Maguire <camm@debian.org>.
(Sun, 05 May 2024 13:27:03 GMT) (full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Source: cxref
Version: 1.6e-5
Severity: serious
Tags: ftbfs trixie sid
Hi Maintainer
As can be seen in reproducible builds [1], cxref FTBFS on arm64 with
glibc 2.38. I've copied what I hope is the relevant part of the log
below.
A bug was filed against glibc [2], but it seems glibc upstream do not
consider it a bug in glibc.
Regards
Graham
[1] https://tests.reproducible-builds.org/debian/rb-pkg/cxref.html
[2] https://sourceware.org/bugzilla/show_bug.cgi?id=30909
../src/cxref -D_Float128='long double' -O. -NREADME-TMP -xref README.c
/usr/include/aarch64-linux-gnu/bits/math-vector.h:30: cxref: syntax error
The previous 10, current and next 10 symbols are:
-10 | 258 : IDENTIFIER : __overflow
-9 | 40 : '(' : (
-8 | 259 : TYPE_NAME : FILE
-7 | 42 : '*' : *
-6 | 44 : ',' : ,
-5 | 296 : INT : int
-4 | 41 : ')' : )
-3 | 59 : ';' : ;
-2 | 285 : TYPEDEF : typedef
-1 | 258 : IDENTIFIER : __Float32x4_t
0 | 258 : IDENTIFIER : __f32x4_t
1 | 59 : ';' : ;
2 | 285 : TYPEDEF : typedef
3 | 258 : IDENTIFIER : __Float64x2_t
4 | 258 : IDENTIFIER : __f64x2_t
5 | 59 : ';' : ;
6 | 285 : TYPEDEF : typedef
7 | 258 : IDENTIFIER : __SVFloat32_t
8 | 258 : IDENTIFIER : __sv_f32_t
9 | 59 : ';' : ;
10 | 285 : TYPEDEF : typedef
Reply sent
to Camm Maguire <camm@debian.org>:
You have taken responsibility.
(Mon, 06 May 2024 17:21:03 GMT) (full text, mbox, link).
Notification sent
to Graham Inggs <ginggs@debian.org>:
Bug acknowledged by developer.
(Mon, 06 May 2024 17:21:03 GMT) (full text, mbox, link).
Message #10 received at 1070444-close@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Source: cxref
Source-Version: 1.6e-6
Done: Camm Maguire <camm@debian.org>
We believe that the bug you reported is fixed in the latest version of
cxref, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1070444@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Camm Maguire <camm@debian.org> (supplier of updated cxref package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Mon, 06 May 2024 12:49:07 -0400
Source: cxref
Architecture: source
Version: 1.6e-6
Distribution: unstable
Urgency: medium
Maintainer: Camm Maguire <camm@debian.org>
Changed-By: Camm Maguire <camm@debian.org>
Closes: 979632 1070444
Changes:
cxref (1.6e-6) unstable; urgency=medium
.
* Bug fix: "arm64 FTBFS with glibc 2.38", thanks to Graham Inggs
(Closes: #1070444).
* Bug fix: "no output -- tmpfile is depreced", thanks to Martin Kovarik
(Closes: #979632).
Checksums-Sha1:
001bbefeac7a40120a3b69e7e8bbea5efec2a8e3 1943 cxref_1.6e-6.dsc
653532e570edbb39fcd3eccbbc6295773b045da2 33520 cxref_1.6e-6.debian.tar.xz
8d6ccec12ed56d316c0e60857b9abf5bb2e6ca7f 7183 cxref_1.6e-6_source.buildinfo
Checksums-Sha256:
51c78333ac54ab7804a387f6c9864672a54503ab64ff6ae056bd9bbe322ebe39 1943 cxref_1.6e-6.dsc
6a8f5f5bcd7340be4770e9f8cbb46d3f596253e4cd6b6b310cfbde61b1bc3025 33520 cxref_1.6e-6.debian.tar.xz
a95f3073bf46a1f975d62b7da3c7006c6fbbf6f945079f35bce30acb6ea6df64 7183 cxref_1.6e-6_source.buildinfo
Files:
d805ecd7f12dfc52c6ab608af24b0768 1943 devel optional cxref_1.6e-6.dsc
b8331d7da12de8191c95b3748842102f 33520 devel optional cxref_1.6e-6.debian.tar.xz
3eb005b1e8f783c2f5fd77ce9d189895 7183 devel optional cxref_1.6e-6_source.buildinfo
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEE/iFPNjaXdzJC6BbsuEXOUQ+bcU0FAmY5CmMACgkQuEXOUQ+b
cU1rPA//T//ICuCpV/rjMraRiQeyfGVvlFW1IKV1puE20K7V9Qmw91q+ikn4UTTq
k03QlVeHSY0W1u/EKaKXCKRrZ+Cxinls4qMDe1J1fM3loWv5LkciyRZurxyo6/et
4yybM/kAL5DFZUMmpMiwzXkPwq+FjzspggCf7x7EPyJpEmYAge3LoYtkCnUKt2fA
kDGCV8Qp8dfJT6zr+EVOPz5ZbCE9Xg2XbZL1uBQTmUavj9/0OZz+BLck6zU1mL+9
X6atByCQ/sIj0GZtvQCcUjbJUUDD83yPg2kUxvZagiVFWohT0Mbwu7utTxra6PSv
7tZV0IuB0Fise+ULCJvMf3rEizehcxMIZmJLEuEd5KEI+Bd5ZoMjauedWVVXjlUi
hpKB9bOJj+gJf+qZjIwhcmfyjRiX9NYaE6KAfax2ffwcPWfxVaE+dgjB8nQ6uQDB
cBhRrxZ3vrGO85ER7y8H3n0dfwqVY261hyfff3Q8PgyKGTjTupVk2Eq8zqQUg2fj
i0XoBrl4xloSQRqFC/JxNmrjpmkwoJ5oCZcNa922A+bgHrQkYeONfhrF7nuoCczS
wzxzgBVe5FkAkoLkn0ttwPvXkHqgyo3R7nrwzOzGYyVbc4QEAugEQqO13kaxBaxY
So0eLOxIb9mWKBcLkFIAetOMkmadoJRgWz9f/31UUR+TxtEKLGg=
=Slk7
-----END PGP SIGNATURE-----
[Message part 2 (application/pgp-signature, inline)]
Severity set to 'important' from 'serious'
Request was from Aurelien Jarno <aurel32@debian.org>
to 1070441-submit@bugs.debian.org.
(Mon, 06 May 2024 21:18:07 GMT) (full text, mbox, link).
Added indication that bug 1070444 blocks 1070668
Request was from Aurelien Jarno <aurel32@debian.org>
to 1070441-submit@bugs.debian.org.
(Mon, 06 May 2024 21:18:07 GMT) (full text, mbox, link).
Information forwarded
to debian-bugs-dist@lists.debian.org, Camm Maguire <camm@debian.org>:
Bug#1070444; Package src:cxref.
(Mon, 06 May 2024 21:18:12 GMT) (full text, mbox, link).
Acknowledgement sent
to Aurelien Jarno <aurel32@debian.org>:
Extra info received and forwarded to list. Copy sent to Camm Maguire <camm@debian.org>.
(Mon, 06 May 2024 21:18:12 GMT) (full text, mbox, link).
Message #19 received at 1070444@bugs.debian.org (full text, mbox, reply):
control: severity 1070441 important
control: block 1070668 by 1070441
control: severity 1070443 important
control: block 1070668 by 1070443
control: severity 1070444 important
control: block 1070668 by 1070444
control: severity 1070446 important
control: block 1070668 by 1070446
Dear maintainers,
glibc 2.38 introduced changes to the bits/math-vector.h file on arm64 in
order to support math vector functions. This unfortunately caused the
FTBFS of your packages.
The change has been temporarily reverted in version 2.38-8 until a fix
is found, and I have opened #1070668 on the glibc side to track the
issue, with a Cc: to the arm64 porters.
I am therefore downgrading the bugs to severity important. However this
should not prevent working on a solution to the problem with the arm64
porters, and depending on the case either at the package level, or at
the upstream glibc/gcc/llvm level.
Regards
Aurelien
--
Aurelien Jarno GPG: 4096R/1DDD8C9B
aurelien@aurel32.net http://aurel32.net
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Wed, 03 Jul 2024 07:27:32 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Thu Aug 8 02:45:53 2024;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.