[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#264173: marked as done (xtrlock: FTBFS with gcc-3.4: label at end of compound statement)



Your message dated Mon, 17 Jan 2005 06:02:02 -0500
with message-id <E1CqUe2-0005sB-00@newraff.debian.org>
and subject line Bug#264173: fixed in xtrlock 2.0-9
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 7 Aug 2004 12:43:47 +0000
>From aj@andaco.de Sat Aug 07 05:43:47 2004
Return-path: <aj@andaco.de>
Received: from c214127.adsl.hansenet.de (localhost) [213.39.214.127] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1BtQY6-0000uW-00; Sat, 07 Aug 2004 05:43:47 -0700
Received: from aj by localhost with local (Exim 4.34)
	id 1BtQY5-0001zs-Lj; Sat, 07 Aug 2004 14:43:45 +0200
To: Debian Bug Tracking System <submit@bugs.debian.org>
From: Andreas Jochens <aj@andaco.de>
Subject: xtrlock: FTBFS with gcc-3.4: label at end of compound statement
Message-Id: <E1BtQY5-0001zs-Lj@localhost>
Date: Sat, 07 Aug 2004 14:43:45 +0200
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
	autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: xtrlock
Severity: normal
Tags: patch

When building 'xtrlock' with gcc-3.4 I get the following error:

gcc -O2 -g -DSHADOW_PWD   -c -o xtrlock.o xtrlock.c
xtrlock.c: In function `main':
xtrlock.c:207: error: label at end of compound statement
make[1]: *** [xtrlock.o] Error 1
make[1]: Leaving directory `/xtrlock-2.0'

With the attached patch 'xtrlock' can be compiled using gcc-3.4.

Regards
Andreas Jochens

diff -urN ../tmp-orig/xtrlock-2.0/xtrlock.c ./xtrlock.c
--- ../tmp-orig/xtrlock-2.0/xtrlock.c	2002-09-01 06:46:29.000000000 +0200
+++ ./xtrlock.c	2004-08-07 14:34:11.501808518 +0200
@@ -203,7 +203,6 @@
         break;
       }
       break;
-    default:
     }
   }
  loop_x:

---------------------------------------
Received: (at 264173-close) by bugs.debian.org; 17 Jan 2005 11:05:48 +0000
>From katie@ftp-master.debian.org Mon Jan 17 03:05:48 2005
Return-path: <katie@ftp-master.debian.org>
Received: from newraff.debian.org [208.185.25.31] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1CqUhg-00020b-00; Mon, 17 Jan 2005 03:05:48 -0800
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
	id 1CqUe2-0005sB-00; Mon, 17 Jan 2005 06:02:02 -0500
From: Matthew Vernon <matthew@debian.org>
To: 264173-close@bugs.debian.org
X-Katie: $Revision: 1.55 $
Subject: Bug#264173: fixed in xtrlock 2.0-9
Message-Id: <E1CqUe2-0005sB-00@newraff.debian.org>
Sender: Archive Administrator <katie@ftp-master.debian.org>
Date: Mon, 17 Jan 2005 06:02:02 -0500
Delivered-To: 264173-close@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: xtrlock
Source-Version: 2.0-9

We believe that the bug you reported is fixed in the latest version of
xtrlock, which is due to be installed in the Debian FTP archive:

xtrlock_2.0-9.dsc
  to pool/main/x/xtrlock/xtrlock_2.0-9.dsc
xtrlock_2.0-9.tar.gz
  to pool/main/x/xtrlock/xtrlock_2.0-9.tar.gz
xtrlock_2.0-9_i386.deb
  to pool/main/x/xtrlock/xtrlock_2.0-9_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 264173@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Matthew Vernon <matthew@debian.org> (supplier of updated xtrlock package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----

Format: 1.7
Date: Mon, 17 Jan 2005 10:47:09 +0000
Source: xtrlock
Binary: xtrlock
Architecture: source i386
Version: 2.0-9
Distribution: unstable
Urgency: high
Maintainer: Debian QA Group <packages@qa.debian.org>
Changed-By: Matthew Vernon <matthew@debian.org>
Description: 
 xtrlock    - Minimal X display lock program
Closes: 264173 278190 278191
Changes: 
 xtrlock (2.0-9) unstable; urgency=high
 .
   * Fix the problem whereby we unlocked on long input (closes: #278191, #278190)
   * tidy up a switch statement (closes: #264173)
Files: 
 2b5cb5f98847a8e37b618a95cac9f634 599 x11 optional xtrlock_2.0-9.dsc
 f268de7457416ba57d4b757e62e9eece 7437 x11 optional xtrlock_2.0-9.tar.gz
 c35a5610aa22f4371cfc083f6bdfcc9d 9142 x11 optional xtrlock_2.0-9_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQCVAwUBQeuYF7DSad4X89TRAQHqngP/crvhfHGo463PFP16jtPA6MVTTW2YX0eq
dc87l0eFxFK/Fq6r9I3GTKmQ1LDA7M8ok0zB2DetRvZJg+qZcycUSI7DKLwDEYHp
7H/Je+6Vv/dxWbSwhlIa1lcJLFyJ5HVnjem0sGZuJnNM73M1RqeLxpNuIJBO+z52
Nl4aFO4b55s=
=pPXN
-----END PGP SIGNATURE-----



Reply to: