[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1091160: marked as done (gcin: FTBFS on arm64: make[1]: *** [Makefile:110: all] Error 2)



Your message dated Sun, 22 Dec 2024 23:19:33 +0000
with message-id <E1tPVET-00GesH-PF@fasolo.debian.org>
and subject line Bug#1091160: fixed in gcin 2.9.4+dfsg1-2
has caused the Debian Bug report #1091160,
regarding gcin: FTBFS on arm64: make[1]: *** [Makefile:110: all] Error 2
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1091160: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091160
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Source: gcin
Version: 2.9.4+dfsg1-1
Severity: serious
Justification: FTBFS
Tags: trixie sid ftbfs
User: lucas@debian.org
Usertags: ftbfs-20241222 ftbfs-trixie

Hi,

During a rebuild of all packages in sid, your package failed to build
on arm64.


Relevant part (hopefully):
> ../gcin2tab array10a.cin
> -- gcin2tab encoding UTF-8 --
> --- please use iconv -f big5 -t utf-8 if your file is in big5 encoding
> KeyNum:11 keybits:6
> char def
> MaxPress: 8
> Defined Characters:31700
> export LD_LIBRARY_PATH=../im-client;../tsa2d32 en-american.src
> double free or corruption (out)
> Aborted
> gmake[2]: *** [Makefile:30: en-american] Error 134
> gmake[2]: Leaving directory '/<<PKGBUILDDIR>>/data'
> make[1]: *** [Makefile:110: all] Error 2


The full build log is available from:
http://qa-logs.debian.net/2024/12/22/gcin_2.9.4+dfsg1-1_unstable-arm64.log

All bugs filed during this archive rebuild are listed at:
https://bugs.debian.org/cgi-bin/pkgreport.cgi?tag=ftbfs-20241222;users=lucas@debian.org
or:
https://udd.debian.org/bugs/?release=na&merged=ign&fnewerval=7&flastmodval=7&fusertag=only&fusertagtag=ftbfs-20241222&fusertaguser=lucas@debian.org&allbugs=1&cseverity=1&ctags=1&caffected=1#results

A list of current common problems and possible solutions is available at
http://wiki.debian.org/qa.debian.org/FTBFS . You're welcome to contribute!

If you reassign this bug to another package, please mark it as 'affects'-ing
this package. See https://www.debian.org/Bugs/server-control#affects

If you fail to reproduce this, please provide a build log and diff it with mine
so that we can identify if something relevant changed in the meantime.

--- End Message ---
--- Begin Message ---
Source: gcin
Source-Version: 2.9.4+dfsg1-2
Done: Boyuan Yang <byang@debian.org>

We believe that the bug you reported is fixed in the latest version of
gcin, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1091160@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Boyuan Yang <byang@debian.org> (supplier of updated gcin package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 22 Dec 2024 17:44:22 -0500
Source: gcin
Architecture: source
Version: 2.9.4+dfsg1-2
Distribution: unstable
Urgency: high
Maintainer: Debian Input Method Team <debian-input-method@lists.debian.org>
Changed-By: Boyuan Yang <byang@debian.org>
Closes: 1091160
Changes:
 gcin (2.9.4+dfsg1-2) unstable; urgency=high
 .
   * Team upload.
   * debian/patches/:
     + 0015-tsa2d32.cpp-Do-not-free-pointers-to-avoid-crash-on-a.patch:
       Add a patch to disable potentially problematic free(3) calls
       to circumvent a pointer double-free crash issue during build.
       The potential side-effect of memory leakage is acceptable.
       (Closes: #1091160)
Checksums-Sha1:
 6d19cd25db3760d249e43db4f48c833c05a89453 2832 gcin_2.9.4+dfsg1-2.dsc
 8b73d91e17de358f72e8429d46dd22d88588ca17 4258796 gcin_2.9.4+dfsg1.orig.tar.xz
 bfc3ca31901b6470a084be434f202ecb03e0b346 24752 gcin_2.9.4+dfsg1-2.debian.tar.xz
 b87f91408211024d0673b1d0285c8e3dbd883167 21567 gcin_2.9.4+dfsg1-2_amd64.buildinfo
Checksums-Sha256:
 2fc8a5b14a65e7d80bb69a7fb4861a8eff5bafc988fa682c7364501efe897b9e 2832 gcin_2.9.4+dfsg1-2.dsc
 996c66343894e52fc28f18cec20650888f09ee54a08238bf2548e031ffb63931 4258796 gcin_2.9.4+dfsg1.orig.tar.xz
 fbb8e19c7226f032b47febc80fc9790b525daa10718493509c0943d314b532cd 24752 gcin_2.9.4+dfsg1-2.debian.tar.xz
 87202e61fb710bf10810cc8899835cfac081cded03944e34cd5bc990e8b885b3 21567 gcin_2.9.4+dfsg1-2_amd64.buildinfo
Files:
 fe3c1d324d8910f06aa80ab5afa72401 2832 utils optional gcin_2.9.4+dfsg1-2.dsc
 0dbf26e81a251bd51917d4b7211af7fb 4258796 utils optional gcin_2.9.4+dfsg1.orig.tar.xz
 1f9001d59bce10e6a4cc49ae3bfded6a 24752 utils optional gcin_2.9.4+dfsg1-2.debian.tar.xz
 6e3735a9c2d45ee9664f134973097910 21567 utils optional gcin_2.9.4+dfsg1-2_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=KKGu
-----END PGP SIGNATURE-----

Attachment: pgp5DXLXb5_Mp.pgp
Description: PGP signature


--- End Message ---

Reply to: