Your message dated Sat, 29 Jul 2017 10:03:54 +0000
with message-id <[email protected]>
and subject line Bug#867703: fixed in blktap-dkms 2.0.93-0.10
has caused the Debian Bug report #867703,
regarding blktap-dkms: module FTBFS for Linux 4.11
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
867703: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867703
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: blktap-dkms
Version: 2.0.93-0.8
Severity: serious
Tags: sid buster

Hi,

blktap-dkms fails to build a module for Linux 4.11:

  CC [M]  /var/lib/dkms/blktap/2.0.93/build/device.o
In file included from /var/lib/dkms/blktap/2.0.93/build/linux-blktap.h:66:0,
                 from /var/lib/dkms/blktap/2.0.93/build/blktap.h:33,
                 from /var/lib/dkms/blktap/2.0.93/build/ring.c:38:
/var/lib/dkms/blktap/2.0.93/build/linux-blktap.h:119:24: warning: variably 
modified 'pending' at file scope
        sizeof(((struct blktap_sring *)0)->ring[0])))
                        ^
/usr/src/linux-headers-4.11.0-1-common/include/xen/interface/io/ring.h:15:59: 
note: in definition of macro '__RD2'
 #define __RD2(_x)  (((_x) & 0x00000002) ? 0x2         : ((_x) & 0x1))
                                                           ^~
/usr/src/linux-headers-4.11.0-1-common/include/xen/interface/io/ring.h:17:66: 
note: in expansion of macro '__RD4'
 #define __RD8(_x)  (((_x) & 0x000000f0) ? __RD4((_x)>>4)<<4    : __RD4(_x))
                                                                  ^~~~~
/usr/src/linux-headers-4.11.0-1-common/include/xen/interface/io/ring.h:18:66: 
note: in expansion of macro '__RD8'
 #define __RD16(_x) (((_x) & 0x0000ff00) ? __RD8((_x)>>8)<<8    : __RD8(_x))
                                                                  ^~~~~
/usr/src/linux-headers-4.11.0-1-common/include/xen/interface/io/ring.h:19:66: 
note: in expansion of macro '__RD16'
 #define __RD32(_x) (((_x) & 0xffff0000) ? __RD16((_x)>>16)<<16 : __RD16(_x))
                                                                  ^~~~~~
/var/lib/dkms/blktap/2.0.93/build/linux-blktap.h:117:8: note: in expansion of 
macro '__RD32'
  ((int)__RD32((BLKTAP_PAGE_SIZE -    \
        ^~~~~~
/var/lib/dkms/blktap/2.0.93/build/blktap.h:77:41: note: in expansion of macro 
'BLKTAP_RING_SIZE'
  struct blktap_request         *pending[BLKTAP_RING_SIZE];
                                         ^~~~~~~~~~~~~~~~
/var/lib/dkms/blktap/2.0.93/build/ring.c:187:14: error: initialization from 
incompatible pointer type [-Werror=incompatible-pointer-types]
  .fault    = blktap_ring_fault,
              ^~~~~~~~~~~~~~~~~
/var/lib/dkms/blktap/2.0.93/build/ring.c:187:14: note: (near initialization for 
'blktap_ring_vm_operations.fault')

Andreas

Attachment: blktap.make.log.gz
Description: application/gzip


--- End Message ---
--- Begin Message ---
Source: blktap-dkms
Source-Version: 2.0.93-0.10

We believe that the bug you reported is fixed in the latest version of
blktap-dkms, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Chrysostomos Nanakos <[email protected]> (supplier of updated blktap-dkms 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 29 Jul 2017 12:44:44 +0300
Source: blktap-dkms
Binary: blktap-dkms
Architecture: source
Version: 2.0.93-0.10
Distribution: unstable
Urgency: high
Maintainer: Debian Xen Team <[email protected]>
Changed-By: Chrysostomos Nanakos <[email protected]>
Description:
 blktap-dkms - Xen API blktap kernel component DKMS package
Closes: 867703
Changes:
 blktap-dkms (2.0.93-0.10) unstable; urgency=high
 .
   * Non-maintainer upload.
   * Virtual MM functions ABI has changed so the module
     is failing to compile for Linux versions higher than 4.11.
     (Closes: #867703)
Checksums-Sha1:
 cbb6f4133a1d4f3ab30ede50d3e2f508cfbf162d 1979 blktap-dkms_2.0.93-0.10.dsc
 27c936ab378a098fcaeb134924e69d7e78b06210 21971 blktap-dkms_2.0.93.orig.tar.gz
 e778550377db4898c7a18467641012bdb9d12b56 7724 
blktap-dkms_2.0.93-0.10.debian.tar.xz
Checksums-Sha256:
 3724e784ab2018cb8ee6d97a473d1faf78b112eee25854dcc7bdc17b01f92f32 1979 
blktap-dkms_2.0.93-0.10.dsc
 7211a14bda91b69667b98bda2a3faaed3e4a22b79f1b47b88307374927fa1ab6 21971 
blktap-dkms_2.0.93.orig.tar.gz
 66e4b5e71d07d401ce76ec6ef4bf21c17583634b984725bdcb1d964bd7d8fbd5 7724 
blktap-dkms_2.0.93-0.10.debian.tar.xz
Files:
 de1c4fec6221cc43fe089d00a86fe547 1979 kernel optional 
blktap-dkms_2.0.93-0.10.dsc
 3f44cc47caf09485497e28405b94aa02 21971 kernel optional 
blktap-dkms_2.0.93.orig.tar.gz
 a53532b312e45f8388bcd3fa02f11028 7724 kernel optional 
blktap-dkms_2.0.93-0.10.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=OKf0
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to