Your message dated Tue, 18 Nov 2008 21:02:24 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#502657: fixed in netmaze 0.81+jpg0.82-13
has caused the Debian Bug report #502657,
regarding netmaze: rendering problems and segfaults
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
502657: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502657
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: netmaze
Version: 0.81+jpg0.82-12
Severity: grave
Justification: renders package unusable

Netmaze displays welcome screen normally, then I press 1 and I see [1].
If I press arrow keys randomly, after a while I get a segfault somewhere
in wall_pcoll():

Program received signal SIGSEGV, Segmentation fault.
0x0000000000409b4a in wall_pcoll (xold=4467413632, yold=4456695628,
    player=0x7f3d4b4411a0) at allmove.c:425
425         if(sm->std_maze.vwalls[yc][xc] & MAZE_BLOCK_PLAYER)
(gdb) bt
#0  0x0000000000409b4a in wall_pcoll (xold=4467413632, yold=4456695628,
    player=0x7f3d4b4411a0) at allmove.c:425
#1  0x000000000040a939 in move_all (players=0x7f3d4b4411a0,
    joywerte=0x7f3d4b46aea0) at allmove.c:107
#2  <signal handler called>
#3  0x00007f3d4a854c93 in select () from /lib/libc.so.6
#4  0x0000000000408d50 in main (argc=1, argv=0x7fff5349a998) at
netmaze.c:291

I see this behaviour on two x86_64 Lenny installations.

[1] http://img235.imageshack.us/my.php?image=scdf0.png

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-3aug2008-1 (SMP w/2 CPU cores)
Locale: LANG=ru_UA.UTF-8, LC_CTYPE=ru_UA.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash

Versions of packages netmaze depends on:
ii  libc6                         2.7-14     GNU C Library: Shared libraries
ii  libx11-6                      2:1.1.5-2  X11 client-side library
ii  libxext6                      2:1.0.4-1  X11 miscellaneous extension librar
ii  tix [tix]                     8.4.0-6    The Tix library for Tk -- runtime 
ii  tk8.4                         8.4.19-2   Tk toolkit for Tcl and X11, v8.4 -

netmaze recommends no packages.

netmaze suggests no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: netmaze
Source-Version: 0.81+jpg0.82-13

We believe that the bug you reported is fixed in the latest version of
netmaze, which is due to be installed in the Debian FTP archive:

netmaze_0.81+jpg0.82-13.diff.gz
  to pool/main/n/netmaze/netmaze_0.81+jpg0.82-13.diff.gz
netmaze_0.81+jpg0.82-13.dsc
  to pool/main/n/netmaze/netmaze_0.81+jpg0.82-13.dsc
netmaze_0.81+jpg0.82-13_i386.deb
  to pool/main/n/netmaze/netmaze_0.81+jpg0.82-13_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
John Goerzen <[EMAIL PROTECTED]> (supplier of updated netmaze package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 18 Nov 2008 04:00:42 -0600
Source: netmaze
Binary: netmaze
Architecture: source i386
Version: 0.81+jpg0.82-13
Distribution: unstable
Urgency: low
Maintainer: John Goerzen <[EMAIL PROTECTED]>
Changed-By: John Goerzen <[EMAIL PROTECTED]>
Description: 
 netmaze    - 3-D Multiplayer Combat Game
Closes: 502657 504087
Changes: 
 netmaze (0.81+jpg0.82-13) unstable; urgency=low
 .
   * Ack NMU.  Closes: #502657.
   * Patch from Peter Green to hack -O3 to -O2 on ia64, working around a bug in
     gcc that was causing FTBFS.  Closes: #504087.
Checksums-Sha1: 
 41f0fefae82a00677eec5ed04e88a736400d0fd9 1053 netmaze_0.81+jpg0.82-13.dsc
 794e45e73b235981482d1697b2040b021536ff56 41442 netmaze_0.81+jpg0.82-13.diff.gz
 1489f0bc3974c1545543036ee57f775f9250b6ae 300002 
netmaze_0.81+jpg0.82-13_i386.deb
Checksums-Sha256: 
 ac08ac25c3c0170829f3dbbbc6f33cb08a81188b94e20f7714d462f073d9f2a1 1053 
netmaze_0.81+jpg0.82-13.dsc
 6c8b889cdbf7d0f1217174b9efee17f2aff567c1db511e18cc31f1ec5d7b30ad 41442 
netmaze_0.81+jpg0.82-13.diff.gz
 0d60a0a03429ba1a5c9536418251c1c06731d361c37c847fbc314860cb721826 300002 
netmaze_0.81+jpg0.82-13_i386.deb
Files: 
 d4a085848701e4023cf58a6bb5a1b975 1053 games optional 
netmaze_0.81+jpg0.82-13.dsc
 96832e9bdc6df4a87902a3c2abdecae7 41442 games optional 
netmaze_0.81+jpg0.82-13.diff.gz
 91fc0735c36aa1ae0307bab05aeaeff3 300002 games optional 
netmaze_0.81+jpg0.82-13_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkjLOIACgkQthyt9Q6V7kvQ0gCeOjClqk2GnxxdLq0QNfM/MKFa
Ve0An2JVwSRYEPmFMh+GrzH8K24JP3oU
=OPQY
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to