pspp-dev
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: pspp package FTBFS on armhf


From: Lennart Sorensen
Subject: Re: pspp package FTBFS on armhf
Date: Mon, 18 Aug 2014 14:13:54 -0400
User-agent: Mutt/1.5.21 (2010-09-15)

On Sun, Aug 17, 2014 at 08:19:25AM +0200, Friedrich Beckmann wrote:
> Dear Ben,
> 
> Am 15.08.2014 um 16:52 schrieb Ben Pfaff <address@hidden>:
> 
> > Reading https://dsa.debian.org/doc/guest-account/, one of the
> > requirements is "People requesting access should already have a track
> > record of working on Debian for some time."  Do you qualify?
> 
> I did not do other things in Debian, so I do not qualify. I thought this was
> the only way to get access to an armhf machine to debug the build problem, 
> but you
> proposed and already implemented: 
> 
> > the testsuite.log is often sufficient to debug problems
> 
> Thank you doing this. In addition Héctor Orón gave me access to 
> ipa.debian.net so I have
> another possibility to look into the problem. 

Well it seems there is some segfaulting in some of the test cases:

For example test 0485:

Starting program: /root/pspp-0.8.3/src/ui/terminal/.libs/pspp -O format=csv 
0485/means-hg.sps
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/arm-linux-gnueabihf/libthread_db.so.1".
Cannot access memory at address 0x0

Program received signal SIGILL, Illegal instruction.
0xb62a5ca8 in ?? () from /usr/lib/arm-linux-gnueabihf/libcrypto.so.1.0.0
(gdb) where
#0  0xb62a5ca8 in ?? () from /usr/lib/arm-linux-gnueabihf/libcrypto.so.1.0.0
#1  0xb62a390c in OPENSSL_cpuid_setup () from 
/usr/lib/arm-linux-gnueabihf/libcrypto.so.1.0.0
#2  0xb6fe225e in call_init (l=<optimized out>, argc=4, argv=0xbefffd04, 
env=0xbefffd18) at dl-init.c:78
#3  0xb6fe22f0 in _dl_init (main_map=0xb6fff958, argc=4, argv=0xbefffd04, 
env=0xbefffd18) at dl-init.c:126
#4  0xb6fd7bf2 in _dl_start_user () from /lib/ld-linux-armhf.so.3
Backtrace stopped: previous frame identical to this frame (corrupt stack?)
(gdb) continue
Continuing.

Program received signal SIGSEGV, Segmentation fault.
variable_matches_case (address@hidden, c=0x0) at src/data/case.c:475
475       return (case_idx < caseproto_get_n_widths (c->proto)
(gdb) where
#0  variable_matches_case (address@hidden, c=0x0) at src/data/case.c:475
#1  0xb6e77cda in case_data (address@hidden, v=0x3ea78) at src/data/case.c:267
#2  0xb6f5de5e in update_n (aux1=0xbefffab8, aux2=0x3eb28, user_data=0x41580, 
c=<optimized out>, weight=1) at src/language/stats/means.c:917
#3  0xb6f98ed0 in categoricals_update (cat=0x41060, address@hidden) at 
src/math/categoricals.c:450
#4  0xb6f5e438 in run_means (ds=0x2e2b0, input=0x41048, cmd=0xbefffab8) at 
src/language/stats/means.c:1021
#5  cmd_means (lexer=<optimized out>, ds=0x2e2b0) at 
src/language/stats/means.c:784
#6  0xb6f3b198 in do_parse_command (state=CMD_STATE_DATA, ds=<optimized out>, 
lexer=0x2e920) at src/language/command.c:233
#7  cmd_parse_in_state (lexer=0x2e920, ds=0x2e2b0, state=CMD_STATE_DATA) at 
src/language/command.c:148
#8  0x000126de in main (argc=<optimized out>, argv=<optimized out>) at 
src/ui/terminal/main.c:138
(gdb) list
470        Useful in assertions. */
471     static bool UNUSED
472     variable_matches_case (const struct ccase *c, const struct variable *v)
473     {
474       size_t case_idx = var_get_case_index (v);
475       return (case_idx < caseproto_get_n_widths (c->proto)
476               && caseproto_get_width (c->proto, case_idx) == var_get_width 
(v));
477     }
478
479     /* Internal helper function for case_copy(). */

(Note it is _normal_ to get sigill from openssl and having to continue).
Normal can be weird.

c is NULL in this call it seems, so dereferencing it seems like a bad idea.

-- 
Len Sorensen



reply via email to

[Prev in Thread] Current Thread [Next in Thread]