Your message dated Tue, 23 May 2023 17:05:42 +0000
with message-id <[email protected]>
and subject line Bug#1034873: fixed in cmake 3.26.4-1
has caused the Debian Bug report #1034873,
regarding cmake: FTBFS with LTO enabled on many architectures
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1034873: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034873
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: cmake
Version: 3.25.1-1
Severity: minor
Tags: patch
User: [email protected]
Usertags: origin-ubuntu ubuntu-patch
X-Debbugs-Cc: [email protected]
Dear Maintainer,
cmake fails to execute its buildtime tests (dh_auto_test) on many
architectures when compiled with an LTO enabled toolchain. E.g. on
Ubuntu/s390x (GCC-12 + LTO) we saw the following failure:
# CustomCommand test fails (LP: #2015872):
# No INFO:symbol[pcStatic] found in:
/<<PKGBUILDDIR>>/Build/Tests/CustomCommand/bin/libpcStatic.a
# Instead it produces the following strings (`strings bin/libpcStatic.a | grep
INFO`):
# INFO:symbol[]
# INFO:symbol[pcStatic]
We also observed failures on amd64, arm64 and ppc64el in addition to s390x:
https://git.launchpad.net/ubuntu/+source/lto-disabled-list/commit/?h=ubuntu/devel&id=57f7f783
This does not directly affect Debian, but might, should Debian enable LTO by
default in the future. Please consider disabling LTO explicitly to avoid such
(future) failure, or feel free to reject this patch if you feel like it doesn't
apply.
* d/rules: Disable LTO to fix FTBFS (LP: #2015872)
Thanks for considering the patch.
-- Lukas
-- System Information:
Debian Release: bookworm/sid
APT prefers jammy-updates
APT policy: (500, 'jammy-updates'), (500, 'jammy-security'), (500, 'jammy'),
(100, 'jammy-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 5.19.0-38-generic (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
diff -Nru cmake-3.25.1/debian/rules cmake-3.25.1/debian/rules
--- cmake-3.25.1/debian/rules 2022-11-30 20:56:26.000000000 +0100
+++ cmake-3.25.1/debian/rules 2023-04-11 15:05:40.000000000 +0200
@@ -2,6 +2,14 @@
include /usr/share/dpkg/pkg-info.mk
+# LTO makes the cmake build FTBFS on many architectures:
+#
https://git.launchpad.net/ubuntu/+source/lto-disabled-list/commit/?h=ubuntu/devel&id=57f7f783
+# E.g. on s390x it makes the CustomCommand test fail (LP: #2015872):
+# No INFO:symbol[pcStatic] found in:
/<<PKGBUILDDIR>>/Build/Tests/CustomCommand/bin/libpcStatic.a
+# Instead it produces the following strings (`strings bin/libpcStatic.a | grep
INFO`):
+# INFO:symbol[]
+# INFO:symbol[pcStatic]
+export DEB_BUILD_MAINT_OPTIONS=optimize=-lto
export DEB_CXXFLAGS_MAINT_APPEND := $(shell dpkg-buildflags --get CPPFLAGS)
export DEB_CFLAGS_MAINT_APPEND := $(shell dpkg-buildflags --get CPPFLAGS)
export DEB_LDFLAGS_MAINT_APPEND := -Wl,--as-needed
--- End Message ---
--- Begin Message ---
Source: cmake
Source-Version: 3.26.4-1
Done: Timo Röhling <[email protected]>
We believe that the bug you reported is fixed in the latest version of
cmake, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Timo Röhling <[email protected]> (supplier of updated cmake package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Tue, 23 May 2023 17:38:50 +0200
Source: cmake
Architecture: source
Version: 3.26.4-1
Distribution: experimental
Urgency: medium
Maintainer: Debian CMake Team <[email protected]>
Changed-By: Timo Röhling <[email protected]>
Closes: 1034873
Changes:
cmake (3.26.4-1) experimental; urgency=medium
.
* Do not build with link-time optimization (Closes: #1034873)
* Fix obsolete Build-Depend on libncurses5-dev
* Bump Standards-Version to 4.6.2
* New upstream version 3.26.4
* Enable hardening flags
Checksums-Sha1:
f4bde2b4d07e8588b24cbf26bb6724a0ad766af9 3886 cmake_3.26.4-1.dsc
8aedeb1dcd57f0b3c8953ac3589a898373899faa 10669686 cmake_3.26.4.orig.tar.gz
033b804e31059b788216f85f1cc9429dc58ec2a4 32608 cmake_3.26.4-1.debian.tar.xz
291dcd17ddd629aba049ab0b16a6ab751a0f2148 13358 cmake_3.26.4-1_amd64.buildinfo
Checksums-Sha256:
a1f588ef72f3f18d02ddcd3959aad255dac7ab96db11aac19a8d257126a5cb9e 3886
cmake_3.26.4-1.dsc
313b6880c291bd4fe31c0aa51d6e62659282a521e695f30d5cc0d25abbd5c208 10669686
cmake_3.26.4.orig.tar.gz
7565457e49e32b5fc38521db2267328b65f515b625026b789a95e0ccef826172 32608
cmake_3.26.4-1.debian.tar.xz
04d22bf0dbef283b16533e0fe1c6a6e841ea1d49941b9c55296ad3e2eb326f2d 13358
cmake_3.26.4-1_amd64.buildinfo
Files:
c75dbcdfe1808f023965881eba02e211 3886 devel optional cmake_3.26.4-1.dsc
9095556a3b268fd88c995d2bb4c90320 10669686 devel optional
cmake_3.26.4.orig.tar.gz
3abcc43db520cf2ec91fc23288eb9c92 32608 devel optional
cmake_3.26.4-1.debian.tar.xz
62955c7ad98dbd91a38df83945cdaee3 13358 devel optional
cmake_3.26.4-1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=xuhT
-----END PGP SIGNATURE-----
--- End Message ---