Bug#1081303: rocdbgapi: FTBFS on ppc64el
Source: rocdbgapi
Version: 5.7.1-1
Severity: important
Tags: ftbfs patch
X-Debbugs-Cc: zumbi@debian.org
Hello,
Package fails to build from source on ppc64el architecture:
https://buildd.debian.org/status/fetch.php?pkg=rocdbgapi&arch=ppc64el&ver=5.7.1-1&stamp=1719421340&raw=0
I have submitted upstream a fix for the build:
https://github.com/ROCm/ROCdbgapi/pull/15
Description: Fix build for ppc64el
Author: Héctor Orón Martínez
Forwarded: https://github.com/ROCm/ROCdbgapi/pull/15
Last-Update: 2024-09-10
Index: rocdbgapi-5.7.1/src/os_driver.cpp
===================================================================
--- rocdbgapi-5.7.1.orig/src/os_driver.cpp
+++ rocdbgapi-5.7.1/src/os_driver.cpp
@@ -1332,7 +1332,7 @@ to_string (os_runtime_info_t runtime_inf
{
return string_printf (
"{ .r_debug=%#llx, .runtime_state=%s, .ttmp_setup=%d }",
- runtime_info.r_debug,
+ (unsigned long long) runtime_info.r_debug,
to_cstring (static_cast<os_runtime_state_t> (runtime_info.runtime_state)),
runtime_info.ttmp_setup);
}
@@ -1368,9 +1368,12 @@ to_string (os_queue_snapshot_entry_t sna
".write_pointer_address=%#llx, .read_pointer_address=%#llx, "
".ctx_save_restore_address=%#llx, .queue_id=%d, .gpu_id=%d, "
".ring_size=%d, .queue_type=%d }",
- snapshot.exception_status, snapshot.ring_base_address,
- snapshot.write_pointer_address, snapshot.read_pointer_address,
- snapshot.ctx_save_restore_address, snapshot.queue_id, snapshot.gpu_id,
+ (unsigned long long) snapshot.exception_status,
+ (unsigned long long) snapshot.ring_base_address,
+ (unsigned long long) snapshot.write_pointer_address,
+ (unsigned long long) snapshot.read_pointer_address,
+ (unsigned long long) snapshot.ctx_save_restore_address,
+ snapshot.queue_id, snapshot.gpu_id,
snapshot.ring_size, snapshot.queue_type);
}
Index: rocdbgapi-5.7.1/src/queue.cpp
===================================================================
--- rocdbgapi-5.7.1.orig/src/queue.cpp
+++ rocdbgapi-5.7.1/src/queue.cpp
@@ -788,8 +788,11 @@ aql_queue_t::update_waves ()
{
log_info ("decoding %s's context save area: "
"ctrl_stk:[0x%llx..0x%llx[, wave_area:[0x%llx..0x%llx[",
- to_cstring (id ()), control_stack_begin, control_stack_end,
- wave_area_begin, wave_area_end);
+ to_cstring (id ()),
+ (unsigned long long) control_stack_begin,
+ (unsigned long long) control_stack_end,
+ (unsigned long long) wave_area_begin,
+ (unsigned long long) wave_area_end);
/* Read the entire control stack from the inferior in one go. */
amd_dbgapi_size_t size = control_stack_end - control_stack_begin;
Regards
-- System Information:
Debian Release: trixie/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 6.10.7-amd64 (SMP w/8 CPU threads; PREEMPT)
Kernel taint flags: TAINT_USER
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=ca_ES:ca
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Reply to: