Your message dated Sat, 17 Jan 2026 22:23:17 +0000
with message-id <[email protected]>
and subject line Bug#1122137: fixed in apache2 2.4.66-3
has caused the Debian Bug report #1122137,
regarding apache2 FTCBFS: uses AC_RUN_IFELSE
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1122137: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122137
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: apache2
Version: 2.4.66-1
Tags: patch upstream
User: [email protected]
Usertags: ftcbfs

Thanks for applying my earlier cross build patches. Now with the new
upstream release, there is a new cross build regression. A use of
AC_RUN_IFELSE was introduced and that cannot possibly work during a
cross build. Fortunately, what is being tested is sizes of data types
and AC_CHECK_SIZEOF has been made compatible with cross building in a
creative way. (In a native build it indeed runs stuff, but for cross
building it uses compilation bisection to discover the size.) Employing
that macro, we may perform the same check. I'm attaching a patch for
your convenience.

Please consider applying the patch and also forwarding it upstream
together with the patch that already is being applied. Both patches are
beneficial to other distributions such as Yocto or PtxDist.

Helmut
Index: apache2-2.4.66/acinclude.m4
===================================================================
--- apache2-2.4.66.orig/acinclude.m4
+++ apache2-2.4.66/acinclude.m4
@@ -721,16 +721,9 @@ dnl Checks if the size of a void pointer
 dnl integer type.
 dnl
 AC_DEFUN([APACHE_CHECK_VOID_PTR_LEN], [
-
-AC_CACHE_CHECK([for void pointer length], [ap_cv_void_ptr_lt_long],
-[AC_TRY_RUN([
-int main(void)
-{
-    return sizeof(void *) < sizeof(long); 
-}], [ap_cv_void_ptr_lt_long=no], [ap_cv_void_ptr_lt_long=yes], 
-    [ap_cv_void_ptr_lt_long=yes])])
-
-if test "$ap_cv_void_ptr_lt_long" = "yes"; then
+AC_CHECK_SIZEOF([void *])
+AC_CHECK_SIZEOF([long])
+if test "$ac_cv_sizeof_void_p" -lt "$ac_cv_sizeof_long"; then
     AC_MSG_ERROR([Size of "void *" is less than size of "long"])
 fi
 ])

--- End Message ---
--- Begin Message ---
Source: apache2
Source-Version: 2.4.66-3
Done: Bastien Roucariès <[email protected]>

We believe that the bug you reported is fixed in the latest version of
apache2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastien Roucariès <[email protected]> (supplier of updated apache2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 17 Jan 2026 12:54:11 +0100
Source: apache2
Architecture: source
Version: 2.4.66-3
Distribution: experimental
Urgency: medium
Maintainer: Debian Apache Maintainers <[email protected]>
Changed-By: Bastien Roucariès <[email protected]>
Closes: 1054562 1072804 1122137 1125368
Changes:
 apache2 (2.4.66-3) experimental; urgency=medium
 .
   [ Helmut Grohne ]
   * Add a new cross build patch (Closes: #1122137)
 .
   [ Bastien Roucariès ]
   * Fix apache2-bin: regular seg faults in mod_http2
     (Closes: #1125368)
   * Emit per default XHTML for autoindex (Closes: #1072804)
   * Add a list-vhosts command (Closes: #1054562)
Checksums-Sha1:
 881bbd69c315b049096d4773a9aee0d8d4250469 3680 apache2_2.4.66-3.dsc
 9a2de37ab3a9e4603a0a98f4e2255a6bfed005d4 9828043 apache2_2.4.66.orig.tar.gz
 a0525bf2f2f51a508b61d7d78e3dca19276de0d0 833 apache2_2.4.66.orig.tar.gz.asc
 ed311926b331afe692d607eb2dd9746d4c54c9df 826748 apache2_2.4.66-3.debian.tar.xz
 e17bf0bf9789796459cb453bfae0e6b33f7766ae 5780 apache2_2.4.66-3_source.buildinfo
Checksums-Sha256:
 d79d6fe56221a581ce2a56b277ee0528e10eb3154ef239c8e34009eb9c39d6be 3680 
apache2_2.4.66-3.dsc
 442184763b60936471b88a91275f79d2407733b7aac27e345f270e8bc31c3d49 9828043 
apache2_2.4.66.orig.tar.gz
 d39cdcb8d723e3c5bd4edc1e248d52c4fd352fb10eeda91cae973b12325605bc 833 
apache2_2.4.66.orig.tar.gz.asc
 07d2e0da21ca91de7bf1b75d8a24896b9d451024235320e773edd36ba0afe8f3 826748 
apache2_2.4.66-3.debian.tar.xz
 007ae8b5ecc2bf328afcb3fcb284a9ed31d082cecf3d15fff9ee9c489a82335f 5780 
apache2_2.4.66-3_source.buildinfo
Files:
 f736d69a388d3d1a0218f1c15b0c4025 3680 httpd optional apache2_2.4.66-3.dsc
 91b20bb90cf7d1eeb225e5b7246ce93d 9828043 httpd optional 
apache2_2.4.66.orig.tar.gz
 2823799bf1d4b8e771a672d1d6f6ce60 833 httpd optional 
apache2_2.4.66.orig.tar.gz.asc
 1a9d624ead13a020c434fff4f4954888 826748 httpd optional 
apache2_2.4.66-3.debian.tar.xz
 8ff51f4bc959595655ee51fc16719dba 5780 httpd optional 
apache2_2.4.66-3_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=3eb+
-----END PGP SIGNATURE-----

Attachment: pgpS6KY6fETOX.pgp
Description: PGP signature


--- End Message ---

Reply via email to