[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: pspp package FTBFS on armhf

From: Lennart Sorensen
Subject: Re: pspp package FTBFS on armhf
Date: Mon, 18 Aug 2014 14:13:54 -0400
User-agent: Mutt/1.5.21 (2010-09-15)

On Sun, Aug 17, 2014 at 08:19:25AM +0200, Friedrich Beckmann wrote:
> Dear Ben,
> Am 15.08.2014 um 16:52 schrieb Ben Pfaff <address@hidden>:
> > Reading, one of the
> > requirements is "People requesting access should already have a track
> > record of working on Debian for some time."  Do you qualify?
> I did not do other things in Debian, so I do not qualify. I thought this was
> the only way to get access to an armhf machine to debug the build problem, 
> but you
> proposed and already implemented: 
> > the testsuite.log is often sufficient to debug problems
> Thank you doing this. In addition Héctor Orón gave me access to 
> so I have
> another possibility to look into the problem. 

Well it seems there is some segfaulting in some of the test cases:

For example test 0485:

Starting program: /root/pspp-0.8.3/src/ui/terminal/.libs/pspp -O format=csv 
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/arm-linux-gnueabihf/".
Cannot access memory at address 0x0

Program received signal SIGILL, Illegal instruction.
0xb62a5ca8 in ?? () from /usr/lib/arm-linux-gnueabihf/
(gdb) where
#0  0xb62a5ca8 in ?? () from /usr/lib/arm-linux-gnueabihf/
#1  0xb62a390c in OPENSSL_cpuid_setup () from 
#2  0xb6fe225e in call_init (l=<optimized out>, argc=4, argv=0xbefffd04, 
env=0xbefffd18) at dl-init.c:78
#3  0xb6fe22f0 in _dl_init (main_map=0xb6fff958, argc=4, argv=0xbefffd04, 
env=0xbefffd18) at dl-init.c:126
#4  0xb6fd7bf2 in _dl_start_user () from /lib/
Backtrace stopped: previous frame identical to this frame (corrupt stack?)
(gdb) continue

Program received signal SIGSEGV, Segmentation fault.
variable_matches_case (address@hidden, c=0x0) at src/data/case.c:475
475       return (case_idx < caseproto_get_n_widths (c->proto)
(gdb) where
#0  variable_matches_case (address@hidden, c=0x0) at src/data/case.c:475
#1  0xb6e77cda in case_data (address@hidden, v=0x3ea78) at src/data/case.c:267
#2  0xb6f5de5e in update_n (aux1=0xbefffab8, aux2=0x3eb28, user_data=0x41580, 
c=<optimized out>, weight=1) at src/language/stats/means.c:917
#3  0xb6f98ed0 in categoricals_update (cat=0x41060, address@hidden) at 
#4  0xb6f5e438 in run_means (ds=0x2e2b0, input=0x41048, cmd=0xbefffab8) at 
#5  cmd_means (lexer=<optimized out>, ds=0x2e2b0) at 
#6  0xb6f3b198 in do_parse_command (state=CMD_STATE_DATA, ds=<optimized out>, 
lexer=0x2e920) at src/language/command.c:233
#7  cmd_parse_in_state (lexer=0x2e920, ds=0x2e2b0, state=CMD_STATE_DATA) at 
#8  0x000126de in main (argc=<optimized out>, argv=<optimized out>) at 
(gdb) list
470        Useful in assertions. */
471     static bool UNUSED
472     variable_matches_case (const struct ccase *c, const struct variable *v)
473     {
474       size_t case_idx = var_get_case_index (v);
475       return (case_idx < caseproto_get_n_widths (c->proto)
476               && caseproto_get_width (c->proto, case_idx) == var_get_width 
477     }
479     /* Internal helper function for case_copy(). */

(Note it is _normal_ to get sigill from openssl and having to continue).
Normal can be weird.

c is NULL in this call it seems, so dereferencing it seems like a bad idea.

Len Sorensen

reply via email to

[Prev in Thread] Current Thread [Next in Thread]