Your message dated Sat, 23 Sep 2023 23:06:54 +0000
with message-id <e1qkbia-00e5gc...@fasolo.debian.org>
and subject line Bug#1051864: fixed in sparse 0.6.4-4
has caused the Debian Bug report #1051864,
regarding sparse: FTBFS with llvm-toolchain-16 as default
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1051864: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051864
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: sparse
Version: 0.6.4-3
Severity: serious
Tags: ftbfs
Justification: fails to build from source (but built successfully in the past)
X-Debbugs-Cc: sramac...@debian.org

https://buildd.debian.org/status/fetch.php?pkg=sparse&arch=amd64&ver=0.6.4-3%2Bb1&stamp=1694628480&raw=0

g++ -L/usr/lib/llvm-16/lib  -Wl,-z,relro -Wl,-z,now -Wl,--as-needed 
sparse-llvm.o libsparse.a -lLLVM-16   -o sparse-llvm
/usr/bin/ld: sparse-llvm.o: in function `get_sym_value':
././sparse-llvm.c:305:(.text+0x7b2): undefined reference to `LLVMConstGEP'
/usr/bin/ld: sparse-llvm.o: in function `calc_gep':
././sparse-llvm.c:488:(.text+0xe37): undefined reference to 
`LLVMBuildInBoundsGEP'
/usr/bin/ld: sparse-llvm.o: in function `output_op_load':
././sparse-llvm.c:714:(.text+0x24a9): undefined reference to `LLVMBuildLoad'
/usr/bin/ld: sparse-llvm.o: in function `output_op_call':
././sparse-llvm.c:822:(.text+0x262e): undefined reference to `LLVMBuildCall'
collect2: error: ld returned 1 exit status

Cheers
-- 
Sebastian Ramacher

--- End Message ---
--- Begin Message ---
Source: sparse
Source-Version: 0.6.4-4
Done: Uwe Kleine-König <uklei...@debian.org>

We believe that the bug you reported is fixed in the latest version of
sparse, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1051...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Uwe Kleine-König <uklei...@debian.org> (supplier of updated sparse package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 24 Sep 2023 00:46:14 +0200
Source: sparse
Architecture: source
Version: 0.6.4-4
Distribution: unstable
Urgency: medium
Maintainer: Uwe Kleine-König <uklei...@debian.org>
Changed-By: Uwe Kleine-König <uklei...@debian.org>
Closes: 1051864
Changes:
 sparse (0.6.4-4) unstable; urgency=medium
 .
   * Disable llvm support as it fails to compile with llvm >= 16 (Closes:
     #1051864)
   * Switch to gcc-13
   * Bump Standards-Version (no changes required)
Checksums-Sha1:
 4abdb5bedf4fcca867bc10fa9f354f03dd067d38 1583 sparse_0.6.4-4.dsc
 27ccf316b6f98570136e524b56b3a78da6e746ac 8556 sparse_0.6.4-4.debian.tar.xz
 90d0f351ab7fa175f72013c702cd9ba764668c4d 14539 sparse_0.6.4-4_amd64.buildinfo
Checksums-Sha256:
 8713c5d500cdaa11618f67087888243979977da5a7b9d5d19802f041823a3796 1583 
sparse_0.6.4-4.dsc
 31500a6f401ae7c73ee772cf7285d5924ed556a8cd78c392ad0d0058afe3b03f 8556 
sparse_0.6.4-4.debian.tar.xz
 c38714982769c84efc2fd12cecdb65deae35f32f8e4bfc42959392681a8a1d95 14539 
sparse_0.6.4-4_amd64.buildinfo
Files:
 f54141502140e76d576a0146b5357274 1583 devel optional sparse_0.6.4-4.dsc
 fdb8e90fc080d1a9fcb7cee942cd7bb3 8556 devel optional 
sparse_0.6.4-4.debian.tar.xz
 568d9cdb0c765bdcab5ebba9e367bb9e 14539 devel optional 
sparse_0.6.4-4_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEP4GsaTp6HlmJrf7Tj4D7WH0S/k4FAmUPa6kACgkQj4D7WH0S
/k4bmggAnXkC/s4OaXMVLGaDwRYbTnfg3GklvjOsgLvGVNXlR8FR/iUUKtLLZCi8
GVBmbGOoiPgK+jB14p2/qgRHLAUEFKUr/KntLOjj8tAdwlsQ4k3aDOx0eOfAnyhI
gObsiv8ssyXnPSUrrzhrh6dTn3Te4a7TCQDAh1h5FYw3OsKfMeoffBMylAAqPpqQ
tJETl7KFG3P+UDRwXeq0BdfTsr2LC14t02d9euv8m+kTMutBOOUl6saaE03pk8jr
ySMJIi/HOH92PW+I5T6e49aYU6GvwiJbV7/KP9ECBalGOBkWh3bVWwmHvLQWvqXg
hpiVcxU9OxiO83AMN97wrVEIDzUvhA==
=mMvu
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to