Your message dated Sun, 04 Feb 2024 14:48:51 +0000
with message-id <e1rwdnf-005g6u...@fasolo.debian.org>
and subject line Bug#1062048: fixed in xen 4.17.3+10-g091466ba55-1
has caused the Debian Bug report #1062048,
regarding xen: FTBFS with Python 3.12 as default
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1062048: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1062048
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: xen
Version: 4.17.2+76-ge1f9cb16e2-1
Severity: serious
Tags: ftbfs patch
User: debian-pyt...@lists.debian.org
Usertags: python3.12

Hi Maintainer

xen FTBFS with Python 3.12 as the default version (i.e. with
python3-defaults/3.12.1-1 from experimental).  I've copied what I hope
is the relevant part of the log below.

I was able to work around this by:

-PY_CFLAGS = $(CFLAGS) $(PY_NOOPT_CFLAGS)
+PY_CFLAGS = $(CFLAGS) $(PY_NOOPT_CFLAGS) -Wno-error=declaration-after-statement

in tools/python/Makefile and tools/pygrub/Makefile.

Regards
Graham


/usr/lib/python3/dist-packages/setuptools/_distutils/cmd.py:66:
SetuptoolsDeprecationWarning: setup.py install is deprecated.
!!

        
********************************************************************************
        Please avoid running ``setup.py`` directly.
        Instead, use pypa/build, pypa/installer or other
        standards-based tools.

        See https://blog.ganssle.io/articles/2021/10/setup-py-deprecated.html
for details.
        
********************************************************************************

!!
  self.initialize_options()
In file included from /usr/include/python3.12/Python.h:44,
                 from xen/lowlevel/xc/xc.c:8:
/usr/include/python3.12/object.h: In function ‘Py_SIZE’:
/usr/include/python3.12/object.h:233:5: error: ISO C90 forbids mixed
declarations and code [-Werror=declaration-after-statement]
  233 |     PyVarObject *var_ob = _PyVarObject_CAST(ob);
      |     ^~~~~~~~~~~
In file included from /usr/include/python3.12/Python.h:53:
/usr/include/python3.12/cpython/longintrepr.h: In function
‘_PyLong_CompactValue’:
/usr/include/python3.12/cpython/longintrepr.h:121:5: error: ISO C90
forbids mixed declarations and code
[-Werror=declaration-after-statement]
  121 |     Py_ssize_t sign = 1 - (op->long_value.lv_tag & _PyLong_SIGN_MASK);
      |     ^~~~~~~~~~
cc1: all warnings being treated as errors
error: command '/usr/bin/x86_64-linux-gnu-gcc' failed with exit code 1

--- End Message ---
--- Begin Message ---
Source: xen
Source-Version: 4.17.3+10-g091466ba55-1
Done: Hans van Kranenburg <h...@knorrie.org>

We believe that the bug you reported is fixed in the latest version of
xen, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1062...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Hans van Kranenburg <h...@knorrie.org> (supplier of updated xen package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 04 Feb 2024 13:45:17 +0100
Source: xen
Architecture: source
Version: 4.17.3+10-g091466ba55-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Xen Team <pkg-xen-de...@lists.alioth.debian.org>
Changed-By: Hans van Kranenburg <h...@knorrie.org>
Closes: 1062048
Changes:
 xen (4.17.3+10-g091466ba55-1) unstable; urgency=medium
 .
   * Update to new upstream version 4.17.3+10-g091466ba55, which also contains
     security fixes for the following issues:
     - arm32: The cache may not be properly cleaned/invalidated (take two)
       XSA-447 CVE-2023-46837
     - pci: phantom functions assigned to incorrect contexts
       XSA-449 CVE-2023-46839
     - VT-d: Failure to quarantine devices in !HVM builds
       XSA-450 CVE-2023-46840
   * Note that the following XSA are not listed, because...
     - XSA-448 has patches for the Linux kernel.
   * Compilation with Python 3.12 has been fixed in upstream commit 4000522008
     ("Only compile the hypervisor with -Wdeclaration-after-statement")
     (Closes: #1062048)
Checksums-Sha1:
 6dc8e1f474a9f2526638c8c48a7ebb638315b862 4482 xen_4.17.3+10-g091466ba55-1.dsc
 8c9e98e1cd4b9925a2e599d9cf406f443847a3de 4671096 
xen_4.17.3+10-g091466ba55.orig.tar.xz
 4e8f5e8551e49b3a9a953393107a1ef900f54ee2 136956 
xen_4.17.3+10-g091466ba55-1.debian.tar.xz
Checksums-Sha256:
 141c97c9fcc01d55802b9e4daabb52f2179858039d488338f4929f241020931b 4482 
xen_4.17.3+10-g091466ba55-1.dsc
 3d9e9e898972da50456fd885a39e4cbe19b0e0bc028c83edaf0ba7cb2e6128f2 4671096 
xen_4.17.3+10-g091466ba55.orig.tar.xz
 4e03aa91cec9faa7dea27a0b502efea23aa20450a334b61bac5b50c4a27651f3 136956 
xen_4.17.3+10-g091466ba55-1.debian.tar.xz
Files:
 006ecbeca3d2534690db1ab943a5e61a 4482 admin optional 
xen_4.17.3+10-g091466ba55-1.dsc
 b51b55f52b3baf6427ff88de9d122570 4671096 admin optional 
xen_4.17.3+10-g091466ba55.orig.tar.xz
 3577e1a53ddc3485acd1c6f11d433f57 136956 admin optional 
xen_4.17.3+10-g091466ba55-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEESWyddwNaG9637koYssHfcmNhX2wFAmW/lcMACgkQssHfcmNh
X2yGCw/8DjKomT6o1BJjbP4BRnz4+08OIHfmwQsZ9Em7Vaz4+N2zgeJ+nbNmMLPP
KIKcLMTrtM1yYiD+fg/lArx52h7ZAGn6d4Zf1d2cttNW6UnBkszxOO+z89yi0uNo
MdWjG91EOBChIwJ+QdcIk9QMNIiSmKBPws2mFsThk2L/2MONJ+hlBvp0Qao38fuX
C+b9s4ByAt3T/+Mrlfxkc2b/EE6ihA6vt2Evq8VzMJZiMoafnq3WSM4pIbzQ7KmK
ES4DSx5UJK15WNky2Ah4S8A5jJOGSlEFdAXz+VlJWPS9eQ5nGlczT19leCQDJCfi
q/YyJmYcNM44zziBEiZ//RDqH2Dt+XuMj7F0BfNQdAW0fMA3SOaa8i2sVfQhcNUu
cvGVqEH+ZAZGoQTzHAYVSBL5gzUrwGy7h7//WNu1H7+7PsjxcHl4UMHSxkflF9+U
bHHvp0AYVwc67nSmNGlk6hQ24zqjyeukTCVeR7zdZ/43ec9eXnixUrjW+cmRnDDs
kAt+xqCeShOwMkDHsFtspZ4RlyB6vitX4/2xnwDQP+Ecrg++Dh2XchF82hvQHvT6
g/UK0AXHNEVeKrhWhKvWBih9+NrdWgqY4QH4GHMXNGoujSXFXysiaRIGsKlsywty
AnRME2CYQySYLVQduLijHmNJJ6d4mbFj0M00hYHsvZ5LIfRbwgs=
=Z0Xq
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to