Your message dated Wed, 20 Nov 2019 10:25:02 +0100
with message-id <f110380856b01754e91b4e8c0048f8cfa376a5f8.ca...@sfr.fr>
and subject line Re: Bug#943600: lazarus autopkgtest intermittedly fails due to 
EAccessViolation: Access violation
has caused the Debian Bug report #943600,
regarding lazarus autopkgtest intermittedly fails due to EAccessViolation: 
Access violation
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
943600: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943600
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: lazarus
Version: 2.0.2+dfsg-7
Severity: serious
Tags: sid bullseye
X-Debbugs-CC: debian...@lists.debian.org
User: debian...@lists.debian.org
Usertags: flaky

Dear all,

Version 2.0.2+dfsg-7 of lazarus has failed already at least three times
on the ci.d.n infrastructure. The error is always a logged
EAccessViolation, except the stack isn't always the same length. So far
the offset between the two lowest items is the same.

Paul

https://ci.debian.net/data/autopkgtest/testing/amd64/l/lazarus/3271190/log.gz

An unhandled exception occurred at $0000000000000000:
EAccessViolation: Access violation
  $0000000000000000
  $000055EFE24EAB67
  $000055EFE24EBDC1

https://ci.debian.net/data/autopkgtest/unstable/amd64/l/lazarus/3250811/log.gz

An unhandled exception occurred at $0000000000000000:
EAccessViolation: Access violation
  $0000000000000000
  $0000557D05069B67
  $0000557D0506ADC1

https://ci.debian.net/data/autopkgtest/unstable/amd64/l/lazarus/3250711/log.gz

EAccessViolation: Access violation
  $0000563EC38CCBF3
  $0000563EC3D9ABC5
  $0000563EC3D9EB67
  $0000563EC3D9FDC1

- -- System Information:
Debian Release: bullseye/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'testing-debug')
Architecture: amd64 (x86_64)

Kernel: Linux 5.2.0-3-amd64 (SMP w/2 CPU cores)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_OOT_MODULE,
TAINT_UNSIGNED_MODULE
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8),
LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Attachment: signature.asc
Description: OpenPGP digital signature


--- End Message ---
--- Begin Message ---
Control: fixed -1 2.0.6+dfsg-2

It seems the fix in 2.0.6+dfsg-2 was enough to hide the access violation.
The change is forwarded to upstream and we will integrate their final patch once
available.

For now we consider this patch enough to fix the problem in Debian.
-- 
Cheers,
Abou Al Montacir

Attachment: signature.asc
Description: This is a digitally signed message part


--- End Message ---

Reply via email to