Your message dated Wed, 10 Jul 2013 23:04:45 +0000
with message-id <e1ux3rf-0001fo...@franck.debian.org>
and subject line Bug#712376: fixed in xen 4.2.2-1
has caused the Debian Bug report #712376,
regarding xen FTBFS with current gcc-4.8
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
712376: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=712376
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: xen
Version: 4.2.1-2
Severity: serious

When trying to build xen in current sid environment, which now uses
gcc-4.8.1, it fails to build:

gcc -O2 -fomit-frame-pointer -m64 -fno-strict-aliasing -std=gnu99 -Wall 
-Wstrict-prototypes -Wdeclaration-after-statement -Wno-unused-but-set-variable  
 -DNDEBUG -fno-builtin -fno-common -Wredundant-decls -iwithprefix include 
-Werror -Wno-pointer-arith -pipe 
-I/tmp/xen-4.2.1/debian/build/build-hypervisor_amd64_amd64/xen/include  
-I/tmp/xen-4.2.1/debian/build/build-hypervisor_amd64_amd64/xen/include/asm-x86/mach-generic
 
-I/tmp/xen-4.2.1/debian/build/build-hypervisor_amd64_amd64/xen/include/asm-x86/mach-default
 -msoft-float -fno-stack-protector -fno-exceptions -Wnested-externs 
-mno-red-zone -mno-sse -fpic -fno-asynchronous-unwind-tables 
-DGCC_HAS_VISIBILITY_ATTRIBUTE -nostdinc -g -D__XEN__ -include 
/tmp/xen-4.2.1/debian/build/build-hypervisor_amd64_amd64/xen/include/xen/config.h
 -DHAS_ACPI -DHAS_GDBSX -DHAS_PASSTHROUGH -MMD -MF .memory.o.d -c memory.c -o 
memory.o
In file included from 
/tmp/xen-4.2.1/debian/build/build-hypervisor_amd64_amd64/xen/include/public/xen.h:33:0,
                 from 
/tmp/xen-4.2.1/debian/build/build-hypervisor_amd64_amd64/xen/include/xen/time.h:12,
                 from 
/tmp/xen-4.2.1/debian/build/build-hypervisor_amd64_amd64/xen/include/xen/hypercall.h:9,
                 from memory.c:3:
memory.c: In function 'compat_memory_op':
/tmp/xen-4.2.1/debian/build/build-hypervisor_amd64_amd64/xen/include/public/arch-x86/xen.h:35:33:
 error: typedef '__guest_handle_const_compat_memory_exchange_t' locally defined 
but not used [-Werror=unused-local-typedefs]
     typedef struct { type *p; } __guest_handle_ ## name
                                 ^
/tmp/xen-4.2.1/debian/build/build-hypervisor_amd64_amd64/xen/include/public/arch-x86/xen.h:43:5:
 note: in expansion of macro '___DEFINE_XEN_GUEST_HANDLE'
     ___DEFINE_XEN_GUEST_HANDLE(const_##name, const type)
     ^
/tmp/xen-4.2.1/debian/build/build-hypervisor_amd64_amd64/xen/include/public/arch-x86/xen.h:44:41:
 note: in expansion of macro '__DEFINE_XEN_GUEST_HANDLE'
 #define DEFINE_XEN_GUEST_HANDLE(name)   __DEFINE_XEN_GUEST_HANDLE(name, name)
                                         ^
memory.c:261:13: note: in expansion of macro 'DEFINE_XEN_GUEST_HANDLE'
             DEFINE_XEN_GUEST_HANDLE(compat_memory_exchange_t);
             ^
cc1: all warnings being treated as errors
make[7]: *** [memory.o] Error 1
make[7]: Leaving directory 
`/tmp/xen-4.2.1/debian/build/build-hypervisor_amd64_amd64/xen/common/compat'


This does not happen with gcc-4.7.

(I tried to fix a few other xen-related bugs -- like producing wrong ocaml
libs referring to builddir -- #710650, or missing libssl-dev delendency --
#712366, but now it also fails due to gcc-4.8.  Oh well)

Thanks,

/mjt

--- End Message ---
--- Begin Message ---
Source: xen
Source-Version: 4.2.2-1

We believe that the bug you reported is fixed in the latest version of
xen, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 712...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastian Blank <wa...@debian.org> (supplier of updated xen package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Thu, 11 Jul 2013 00:28:24 +0200
Source: xen
Binary: xen-docs-4.2 libxen-4.2 libxenstore3.0 libxen-dev xenstore-utils 
libxen-ocaml libxen-ocaml-dev xen-utils-common xen-utils-4.2 
xen-hypervisor-4.2-amd64 xen-system-amd64 xen-hypervisor-4.2-i386 
xen-system-i386
Architecture: source all amd64
Version: 4.2.2-1
Distribution: unstable
Urgency: low
Maintainer: Debian Xen Team <pkg-xen-de...@lists.alioth.debian.org>
Changed-By: Bastian Blank <wa...@debian.org>
Description: 
 libxen-4.2 - Public libs for Xen
 libxen-dev - Public headers and libs for Xen
 libxen-ocaml - OCaml libraries for controlling Xen
 libxen-ocaml-dev - OCaml libraries for controlling Xen (devel package)
 libxenstore3.0 - Xenstore communications library for Xen
 xen-docs-4.2 - Documentation for Xen
 xen-hypervisor-4.2-amd64 - Xen Hypervisor on AMD64
 xen-hypervisor-4.2-i386 - Xen Hypervisor on i386
 xen-system-amd64 - Xen System on AMD64 (meta-package)
 xen-system-i386 - Xen System on i386 (meta-package)
 xen-utils-4.2 - XEN administrative tools
 xen-utils-common - Xen administrative tools - common files
 xenstore-utils - Xenstore utilities for Xen
Closes: 695176 712366 712376
Changes: 
 xen (4.2.2-1) unstable; urgency=low
 .
   * New upstream release.
     - Fix build with gcc 4.8. (closes: #712376)
   * Build-depend on libssl-dev. (closes: #712366)
   * Enable hardening as much as possible.
   * Re-enable ocaml build fixes. (closes: #695176)
   * Check for out-of-bound values in CPU affinity setup.
     CVE-2013-2072
   * Fix information leak on AMD CPUs.
     CVE-2013-2076
   * Recover from faults on XRSTOR.
     CVE-2013-2077
   * Properly check guest input to XSETBV.
     CVE-2013-2078
Checksums-Sha1: 
 879cfb8869de8a844466554cd6c1faf66f7b9453 2189 xen_4.2.2-1.dsc
 54e42252cd65f134479a5af3c773a16cebf52905 5860055 xen_4.2.2.orig.tar.gz
 1113f4eda7c73344d5036225b36172f1e8ab8b1e 67070 xen_4.2.2-1.debian.tar.gz
 9f59a203b7bf16c5eb47b298f35ff9cdd6aecfcb 641576 xen-docs-4.2_4.2.2-1_all.deb
 1bf3c596bc8ef1f8b6956bed79d5bc4d1331e2d9 115196 
xen-utils-common_4.2.2-1_all.deb
 98634fbf2f81b7f6041a8407cbe1be432ccfbf8d 817002 
xen-hypervisor-4.2-amd64_4.2.2-1_amd64.deb
 3e6a07e678c4452e02648959d7100e1ae4c90bca 18580 
xen-system-amd64_4.2.2-1_amd64.deb
 6e4356d280be2b53a8f568b4a2b820644dc2e14d 146894 libxen-4.2_4.2.2-1_amd64.deb
 349e1ab40f2cbbe42bf5adc5ecf2cc0f83b57779 317164 libxen-dev_4.2.2-1_amd64.deb
 c422de7a2de67415e38361c39c95d5af1d859ed7 30194 libxenstore3.0_4.2.2-1_amd64.deb
 db99fcc337e7dd2f8cba8e8ffbd30049310018ab 1341024 
xen-utils-4.2_4.2.2-1_amd64.deb
 3e3ee89e9507da4eb57f9a05c1fb5768604aad79 26872 xenstore-utils_4.2.2-1_amd64.deb
 1c0a6a48803470157625f8a2ae46820f9cdb7a39 92732 
libxen-ocaml-dev_4.2.2-1_amd64.deb
 cfd4006cf868952072f9eddb5e8530bd967a7980 65912 libxen-ocaml_4.2.2-1_amd64.deb
Checksums-Sha256: 
 375e9de0d7c4b9c3690347a5fcb5df03d6f64a22c6de6d7c34d79f8ab8377b54 2189 
xen_4.2.2-1.dsc
 54b4b2cf934a717fbbc4be4b8317e2e9e3fe689bfa0fbbaa1291e3bdd848fbb4 5860055 
xen_4.2.2.orig.tar.gz
 1ca45e8a569c059f71b63f1c5ecb7e2845bdf6b9b652dbd217fcae3529587ad9 67070 
xen_4.2.2-1.debian.tar.gz
 5d04be0d2bcd8f541caf6fd02ab8a3e920af133565b779034c8fcf1c08d2a212 641576 
xen-docs-4.2_4.2.2-1_all.deb
 a9f14be6109b5d34f13b95d58ffc0e733a974639513a32e0f96978f9109ee3be 115196 
xen-utils-common_4.2.2-1_all.deb
 1c71b67396d363bc66a8bbbcdc5328c875b2e887458e08f99d24c97d21952c59 817002 
xen-hypervisor-4.2-amd64_4.2.2-1_amd64.deb
 0c6d0b4aeababfb549c1566f3a5cc0453565407230bc6c0bf027a9d71e2ea97c 18580 
xen-system-amd64_4.2.2-1_amd64.deb
 d336a443cfb361d0f28523882e7a211c59550536b01c2dfdb6faa1c502b04b35 146894 
libxen-4.2_4.2.2-1_amd64.deb
 eb3759d0776c3eca067473f11c329ce600682f40c8b260de89e63159a240487e 317164 
libxen-dev_4.2.2-1_amd64.deb
 402ab4a6a9efe554516811918424d9808ca66bbc7d93983b3dba8189f599da3a 30194 
libxenstore3.0_4.2.2-1_amd64.deb
 aecbf5490c8c4be524f339ae8d9a1f9a8d12ad17932497d47b1f585dc74e9e59 1341024 
xen-utils-4.2_4.2.2-1_amd64.deb
 07104767dd73eecfe27fb70824e5afc52cee880200113b3d93dca4f27a3004a2 26872 
xenstore-utils_4.2.2-1_amd64.deb
 b8b13dea3d0a465dc4ebde8afe67e3efd9fe1891135daed68d86ddb7126152c1 92732 
libxen-ocaml-dev_4.2.2-1_amd64.deb
 b4ffe56c58acb3cbd3977c5faf8bcb31d50a64571d7063c6e94f695314011c23 65912 
libxen-ocaml_4.2.2-1_amd64.deb
Files: 
 d46386bd416a0ffe9908c31de49566f5 2189 kernel optional xen_4.2.2-1.dsc
 a8a5147809df5e21a5d09c10a465021f 5860055 kernel optional xen_4.2.2.orig.tar.gz
 d816587033cb830c4b955682111f76b7 67070 kernel optional 
xen_4.2.2-1.debian.tar.gz
 802bde89906480a5d873fe1117a211a5 641576 doc optional 
xen-docs-4.2_4.2.2-1_all.deb
 a1dfb9ed61300856bc6983f3ac7e1adf 115196 kernel optional 
xen-utils-common_4.2.2-1_all.deb
 052b00ac26a29abbe40bea6d14b5bc5b 817002 kernel optional 
xen-hypervisor-4.2-amd64_4.2.2-1_amd64.deb
 77edcf3bfd881c21b1f3bd80187fcd8f 18580 kernel optional 
xen-system-amd64_4.2.2-1_amd64.deb
 db24a2f9b6c08c72a92047bcedffed3c 146894 libs optional 
libxen-4.2_4.2.2-1_amd64.deb
 16cc67bd6c72438be24dfd3354412a55 317164 libdevel optional 
libxen-dev_4.2.2-1_amd64.deb
 47b51d215eeb83f2d4355927a704f94c 30194 libs optional 
libxenstore3.0_4.2.2-1_amd64.deb
 585437e872f6df9a8c24f21990fa689c 1341024 kernel optional 
xen-utils-4.2_4.2.2-1_amd64.deb
 77770de3eddbe77670fd78e69f65c994 26872 admin optional 
xenstore-utils_4.2.2-1_amd64.deb
 2a32ac99e50a3352713386736d0cd19b 92732 ocaml optional 
libxen-ocaml-dev_4.2.2-1_amd64.deb
 0b4320f2b1dc584c4e033c5425c93e4f 65912 ocaml optional 
libxen-ocaml_4.2.2-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAlHd5DkACgkQLkAIIn9ODhFsPACgrzkGb5/NoJztxAN5vZr7vNkc
TlEAoPCSE6/wbrAWsH/yeTmUTpPaW2tp
=1Yqy
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to