Source: 3dldf Version: 2.0.3+dfsg-7 Severity: serious Tags: sid buster Hi,
3dldf FTBFS on the above architectures with the error: > ../src/3dldf tngnts_1.ldf > GNU 3DLDF Version 2.0.3 > Copyright (C) 2013 The Free Software Foundation > Author: Laurence D. Finston > > GNU 3DLDF comes with ABSOLUTELY NO WARRANTY; > for details see the file COPYING, > which you should have received in the distribution of GNU 3DLDF 2.0.3 > This is Free Software, and you are welcome to redistribute it under certain > conditions; > for details, again, see the file COPYING. > > Please send bug reports to laurence.fins...@gmx.de > Web site: http://www.gnu.org/software/3dldf/LDF.html > > make[4]: *** [Makefile_sub:21: tngnts_1.mp] Segmentation fault While it didn't fail on amd64, running 3dldf in valgrind (on amd64) immediately crashes so this is probably not an architecture specific error: > $ valgrind ../src/3dldf tngnts_1.ldf > ==29155== Memcheck, a memory error detector > ==29155== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. > ==29155== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info > ==29155== Command: ../src/3dldf tngnts_1.ldf > ==29155== > GNU 3DLDF Version 2.0.3 > Copyright (C) 2013 The Free Software Foundation > Author: Laurence D. Finston > > GNU 3DLDF comes with ABSOLUTELY NO WARRANTY; > for details see the file COPYING, > which you should have received in the distribution of GNU 3DLDF 2.0.3 > This is Free Software, and you are welcome to redistribute it under certain > conditions; > for details, again, see the file COPYING. > > Please send bug reports to laurence.fins...@gmx.de > Web site: http://www.gnu.org/software/3dldf/LDF.html > > ==29155== Conditional jump or move depends on uninitialised value(s) > ==29155== at 0x2A61E9: Id_Map_Entry_Type::operator*=(Transform const&) > (imetfncs.web:3854) > ==29155== by 0x13E602: yyparse(void*) (parser.y++:29090) > ==29155== by 0x134F5C: main (main.web:1478) > ==29155== > ==29155== Invalid read of size 1 > ==29155== at 0x2A6398: Id_Map_Entry_Type::operator*=(Transform const&) > (imetfncs.web:3864) > ==29155== by 0x13E602: yyparse(void*) (parser.y++:29090) > ==29155== by 0x134F5C: main (main.web:1478) > ==29155== Address 0x0 is not stack'd, malloc'd or (recently) free'd > ==29155== > ==29155== > ==29155== Process terminating with default action of signal 11 (SIGSEGV): > dumping core > ==29155== Access not within mapped region at address 0x0 > ==29155== at 0x2A6398: Id_Map_Entry_Type::operator*=(Transform const&) > (imetfncs.web:3864) > ==29155== by 0x13E602: yyparse(void*) (parser.y++:29090) > ==29155== by 0x134F5C: main (main.web:1478) > ==29155== If you believe this happened as a result of a stack > ==29155== overflow in your program's main thread (unlikely but > ==29155== possible), you can try to increase the size of the > ==29155== main thread stack using the --main-stacksize= flag. > ==29155== The main thread stack size used in this run was 8388608. > ==29155== > ==29155== HEAP SUMMARY: > ==29155== in use at exit: 1,207,653 bytes in 21,398 blocks > ==29155== total heap usage: 82,187 allocs, 60,789 frees, 2,678,604 bytes > allocated > ==29155== > ==29155== LEAK SUMMARY: > ==29155== definitely lost: 56,200 bytes in 150 blocks > ==29155== indirectly lost: 309,868 bytes in 7,324 blocks > ==29155== possibly lost: 0 bytes in 0 blocks > ==29155== still reachable: 841,585 bytes in 13,924 blocks > ==29155== suppressed: 0 bytes in 0 blocks > ==29155== Rerun with --leak-check=full to see details of leaked memory > ==29155== > ==29155== For counts of detected and suppressed errors, rerun with: -v > ==29155== Use --track-origins=yes to see where uninitialised values come from > ==29155== ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0) > Segmentation fault Thanks, James
signature.asc
Description: OpenPGP digital signature