[From nobody Sat Mar 14 18:03:06 2026
Received: (at submit) by bugs.debian.org; 6 Dec 2025 15:40:51 +0000
X-Spam-Checker-Version: SpamAssassin 4.0.1-bugs.debian.org_2005_01_02
 (2024-03-25) on buxtehude.debian.org
X-Spam-Level: 
X-Spam-Status: No, score=-8.9 required=4.0 tests=BAYES_00,DKIM_SIGNED,
 DKIM_VALID,FORGED_SPF_HELO,FOURLA,FROMDEVELOPER,SPF_HELO_PASS,SPF_NONE,
 XMAILER_REPORTBUG autolearn=ham autolearn_force=no
 version=4.0.1-bugs.debian.org_2005_01_02
X-Spam-Bayes: score:0.0000 Tokens: new, 18; hammy, 150; neutral, 94; spammy,
 0. spammytokens: hammytokens:0.000-+--sk:buildd.,
 0.000-+--UD:buildd.debian.org, 0.000-+--buildddebianorg,
 0.000-+--buildd.debian.org, 0.000-+--sk:taint_o
Return-path: &lt;wrar@debian.org&gt;
Received: from wrar.name ([91.99.3.191]:54028 helo=durkon.wrar.name)
 by buxtehude.debian.org with esmtps
 (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256)
 (Exim 4.96) (envelope-from &lt;wrar@debian.org&gt;) id 1vRuOx-006tym-1D
 for submit@bugs.debian.org; Sat, 06 Dec 2025 15:40:51 +0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=wrar.name; 
 s=20160710;
 h=Date:Message-ID:Subject:To:From:Content-Transfer-Encoding:
 MIME-Version:Content-Type:From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:
 MIME-Version:Content-Type:Content-Transfer-Encoding:Content-ID:
 Content-Description:Content-Disposition:In-Reply-To:References;
 bh=M+vspwp/zpxjNQEnsq4rc/8crxSw3mDEOQcFyCtUmBc=; b=FdE50CGJ7kwzq3dQCFdHttMLT+
 K709LkG//tuS3PdKtb632aR1OLLe3giTtXhU8CucitUJWg/pgIJWxaIWqLhN++LTmpEvbWjVQutOJ
 KGlyPR9Pp03zQJLLRMusjqa8Bx62EiERWwLtxYjAaa99tT6tCZpHpLZ7pYh2zW1XKXsg=;
Received: from [188.226.55.174] (helo=belkar.localdomain)
 by durkon.wrar.name with esmtpsa (TLS1.3) tls
 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.99)
 (envelope-from &lt;wrar@debian.org&gt;) id 1vRuOv-0000000GWNa-3aqb;
 Sat, 06 Dec 2025 16:40:49 +0100
Received: by belkar.localdomain (Postfix, from userid 1000)
 id F2D656A39202; Sat, 06 Dec 2025 20:40:48 +0500 (+05)
Content-Type: text/plain; charset=&quot;us-ascii&quot;
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Andrey Rakhmatullin &lt;wrar@debian.org&gt;
To: Debian Bug Tracking System &lt;submit@bugs.debian.org&gt;
Subject: FTBFS with Python 3.14: Segmentation fault
Message-ID: &lt;176503564897.461721.9745520777190906979.reportbug@belkar.wrar.name&gt;
X-Mailer: reportbug 13.2.0
Date: Sat, 06 Dec 2025 20:40:48 +0500
Delivered-To: submit@bugs.debian.org

Source: pysph
Version: 1.0~b2-2
Severity: serious
Tags: ftbfs
User: debian-python@lists.debian.org
Usertags: python3.14

There are many test failures (with no details printed due to pytest crashing)
and then a segfault, so there may be multiple problems to fix.

The 3.13 test run also shows many deprecation warnings about things removed in
3.14, which should be the reason to at least some of those test failures.

https://buildd.debian.org/status/fetch.php?pkg=pysph&amp;arch=amd64&amp;ver=1.0%7Eb2-2%2Bb1&amp;stamp=1765033570&amp;raw=0


-- System Information:
Debian Release: forky/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (101, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.17.7+deb14+1-amd64 (SMP w/16 CPU threads; PREEMPT)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=ru_RU.UTF-8, LC_CTYPE=ru_RU.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
]