[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#309340: marked as done ([Release-notes] mention aptitude/woody breakage on hppa)



Your message dated Fri, 27 May 2005 12:54:13 +0200
with message-id <20050527105413.GA27543@yellowpig.yi.org>
and subject line woody -> sarge failure on hppa - aptitude segfault
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 16 May 2005 15:12:22 +0000
>From paul@droflet.net Mon May 16 08:12:22 2005
Return-path: <paul@droflet.net>
Received: from 020.127-30-64.ftth.swbr.surewest.net (pez.droflet.net) [64.30.127.20] 
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1DXhGY-0008CN-00; Mon, 16 May 2005 08:12:22 -0700
Received: from paul by pez.droflet.net with local (Exim 4.34)
	id 1DXhFy-0007hn-4c
	for submit@bugs.debian.org; Mon, 16 May 2005 08:11:49 -0700
Date: Mon, 16 May 2005 08:11:46 -0700 (PDT)
From: Paul Telford <pxt@debian.org>
X-X-Sender: paul@pez.droflet.net
To: submit@bugs.debian.org
Message-ID: <[🔎] Pine.LNX.4.58.0505160803250.29454@pez.droflet.net>
X-GPG-FINGERPRINT: 1024D/431B38BA C903 0E85 9AF5 1B80 6A5F  F169 D7E9 4363 431B 38BA
X-Lucky-Number: 42
MIME-Version: 1.0
Sender: Paul Telford <paul@droflet.net>
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Mail-From: paul@droflet.net
Subject: woody -> sarge failure on hppa - aptitude segfault
Content-Type: TEXT/PLAIN; charset=US-ASCII
X-SA-Exim-Version: 4.0 (built Fri, 24 Sep 2004 13:24:35 -0700)
X-SA-Exim-Scanned: Yes (on pez.droflet.net)
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.4 required=4.0 tests=BAYES_00,HAS_PACKAGE,
	UPPERCASE_25_50 autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: upgrade-reports

Upgrade date: Mon, 16 May 2005 08:03:30 -0700
uname -a: Linux zaphod 2.4.27-pa4 #2 Wed Nov 3 08:18:42 PST 2004 parisc unknown
Method: aptitude


Further Comments/Problems:

Following the instructions in the release notes I installed aptitude.
Then the following:

# aptitude update
Segmentation fault


In fact, any invocation of "aptitude" causes a segfault.  The strace is
similar, though not identical, to the one in #305877.

zaphod:~# strace aptitude
execve("/usr/bin/aptitude", ["aptitude"], [/* 15 vars */]) = 0
newuname({sys="Linux", node="zaphod", ...}) = 0
brk(0)                                  = 0x1bd000
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
0x40017000
open("/etc/ld.so.preload", O_RDONLY)    = -1 ENOENT (No such file or
directory)
open("/etc/ld.so.cache", O_RDONLY)      = 3
fstat64(3, {st_mode=0, st_size=0, ...}) = 0
mmap(NULL, 14420, PROT_READ, MAP_PRIVATE, 3, 0) = 0x40018000
close(3)                                = 0
open("/usr/lib/libsigc-1.0.so.0", O_RDONLY) = 3
read(3, "\177ELF\1\2\1\3\0\0\0\0\0\0\0\0\0\3\0\17\0\0\0\1\0\0J,"..., 1024)
= 1024
fstat64(3, {st_mode=0, st_size=0, ...}) = 0
mmap(NULL, 120372, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x40028000
mprotect(0x40034000, 71220, PROT_NONE)  = 0
mmap(0x40043000, 12288, PROT_READ|PROT_WRITE|PROT_EXEC,
MAP_PRIVATE|MAP_FIXED, 3, 0xb000) = 0x40043000
close(3)                                = 0
open("/lib/libpthread.so.0", O_RDONLY)  = 3
read(3, "\177ELF\1\2\1\3\0\0\0\0\0\0\0\0\0\3\0\17\0\0\0\1\0\0@`"..., 1024)
= 1024
fstat64(3, {st_mode=0, st_size=0, ...}) = 0
mmap(NULL, 181508, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x40046000
mprotect(0x40054000, 124164, PROT_NONE) = 0
mmap(0x40063000, 65536, PROT_READ|PROT_WRITE|PROT_EXEC,
MAP_PRIVATE|MAP_FIXED, 3, 0xd000) = 0x40063000
close(3)                                = 0
open("/usr/lib/libapt-pkg-libc6.2-3.so.3.2", O_RDONLY) = 3
read(3, "\177ELF\1\2\1\3\0\0\0\0\0\0\0\0\0\3\0\17\0\0\0\1\0\3V\304"...,
1024) = 1024
fstat64(3, {st_mode=0, st_size=0, ...}) = 0
mmap(NULL, 964388, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x40073000
mprotect(0x40127000, 227108, PROT_NONE) = 0
mmap(0x40136000, 167936, PROT_READ|PROT_WRITE|PROT_EXEC,
MAP_PRIVATE|MAP_FIXED, 3, 0xb3000) = 0x40136000
close(3)                                = 0
open("/lib/libncurses.so.5", O_RDONLY)  = 3
read(3, "\177ELF\1\2\1\3\0\0\0\0\0\0\0\0\0\3\0\17\0\0\0\1\0\1#d"..., 1024)
= 1024
fstat64(3, {st_mode=0, st_size=0, ...}) = 0
mmap(NULL, 385916, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x4015f000
mprotect(0x401a5000, 99196, PROT_NONE)  = 0
mmap(0x401b4000, 36864, PROT_READ|PROT_WRITE|PROT_EXEC,
MAP_PRIVATE|MAP_FIXED, 3, 0x45000) = 0x401b4000
mmap(0x401bd000, 892, PROT_READ|PROT_WRITE|PROT_EXEC,
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x401bd000
close(3)                                = 0
open("/usr/lib/libstdc++.so.3", O_RDONLY) = 3
read(3, "\177ELF\1\2\1\3\0\0\0\0\0\0\0\0\0\3\0\17\0\0\0\1\0\4\'"..., 1024)
= 1024
fstat64(3, {st_mode=0, st_size=0, ...}) = 0
mmap(NULL, 876672, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x401be000
mprotect(0x40269000, 176256, PROT_NONE) = 0
mmap(0x40278000, 98304, PROT_READ|PROT_WRITE|PROT_EXEC,
MAP_PRIVATE|MAP_FIXED, 3, 0xaa000) = 0x40278000
mmap(0x40290000, 16512, PROT_READ|PROT_WRITE|PROT_EXEC,
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x40290000
close(3)                                = 0
open("/lib/libm.so.6", O_RDONLY)        = 3
read(3, "\177ELF\1\2\1\3\0\0\0\0\0\0\0\0\0\3\0\17\0\0\0\1\0\0\224"...,
1024) = 1024
fstat64(3, {st_mode=0, st_size=0, ...}) = 0
mmap(NULL, 588948, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x40295000
mprotect(0x40313000, 72852, PROT_NONE)  = 0
mmap(0x40322000, 12288, PROT_READ|PROT_WRITE|PROT_EXEC,
MAP_PRIVATE|MAP_FIXED, 3, 0x7d000) = 0x40322000
close(3)                                = 0
open("/lib/libc.so.6", O_RDONLY)        = 3
read(3, "\177ELF\1\2\1\3\0\0\0\0\0\0\0\0\0\3\0\17\0\0\0\1\0\2\37"...,
1024) = 1024
fstat64(3, {st_mode=0, st_size=0, ...}) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
0x4001c000
mmap(NULL, 1386244, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0x40325000
mprotect(0x4045b000, 116484, PROT_NONE) = 0
mmap(0x4046a000, 40960, PROT_READ|PROT_WRITE|PROT_EXEC,
MAP_PRIVATE|MAP_FIXED, 3, 0x135000) = 0x4046a000
mmap(0x40474000, 14084, PROT_READ|PROT_WRITE|PROT_EXEC,
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x40474000
close(3)                                = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
0x4001d000
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
0x4001e000
munmap(0x40018000, 14420)               = 0
getpid()                                = 18469
rt_sigaction(SIGRTMIN, {0x40071f5e, [], 0}, NULL, 8) = 0
rt_sigaction(SIGRT_1, {0x40071f66, [], 0}, NULL, 8) = 0
rt_sigaction(SIGRT_2, {0x40071f6e, [], 0}, NULL, 8) = 0
rt_sigprocmask(SIG_BLOCK, [RTMIN], NULL, 8) = 0
_sysctl(0xfaf00850, 0, 0, 0xfaf00878, 0) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
0x40018000
brk(0)                                  = 0x1bd000
brk(0x1bd030)                           = 0x1bd030
brk(0x1be000)                           = 0x1be000
brk(0x1bf000)                           = 0x1bf000
brk(0x1c0000)                           = 0x1c0000
brk(0x1c1000)                           = 0x1c1000
time(NULL)                              = 1116256236
rt_sigaction(SIGPIPE, {SIG_IGN}, {SIG_DFL}, 8) = 0
brk(0x1c2000)                           = 0x1c2000
open("/usr/share/aptitude/aptitude-defaults", O_RDONLY) = 3
brk(0x1c5000)                           = 0x1c5000
fstat64(3, {st_mode=0, st_size=0, ...}) = 0
mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) =
0x40019000
read(3, "// This file defines some defaul"..., 8192) = 2391
read(3, "", 4096)                       = 0
_llseek(0x3, 0xffffffff, 0xfffff6a9, 0xfaf00f08, 0x1) = 0
--- SIGSEGV (Segmentation fault) ---
+++ killed by SIGSEGV +++



--
Paul Telford | 1024D/431B38BA | pxt@debian.org | paul@droflet.net
       C903 0E85 9AF5 1B80 6A5F  F169 D7E9 4363 431B 38BA


---------------------------------------
Received: (at 309340-done) by bugs.debian.org; 27 May 2005 10:54:17 +0000
>From allomber@math.u-bordeaux.fr Fri May 27 03:54:16 2005
Return-path: <allomber@math.u-bordeaux.fr>
Received: from lns-vlq-7-lil-82-254-197-207.adsl.proxad.net (yellowpig.yi.org) [82.254.197.207] (mail)
	by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
	id 1DbcTo-0002WR-00; Fri, 27 May 2005 03:54:16 -0700
Received: from seventeen
	([127.0.0.1] helo=yellowpig.yi.org ident=mail)
	by yellowpig.yi.org with smtp (Exim 3.35 #1 (Debian))
	id 1DbcTl-0007BH-00; Fri, 27 May 2005 12:54:13 +0200
Received: (nullmailer pid 27605 invoked by uid 1000);
	Fri, 27 May 2005 10:54:13 -0000
Date: Fri, 27 May 2005 12:54:13 +0200
To: Paul Telford <pxt@debian.org>
Cc: 309340-done@bugs.debian.org
Subject: Re: woody -> sarge failure on hppa - aptitude segfault
Message-ID: <20050527105413.GA27543@yellowpig.yi.org>
References: <[🔎] Pine.LNX.4.58.0505160803250.29454@pez.droflet.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[🔎] Pine.LNX.4.58.0505160803250.29454@pez.droflet.net>
User-Agent: Mutt/1.5.9i
From: <allomber@math.u-bordeaux.fr>
Delivered-To: 309340-done@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
	(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-1.4 required=4.0 tests=BAYES_00,NO_REAL_NAME 
	autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

On Mon, May 16, 2005 at 08:11:46AM -0700, Paul Telford wrote:
> Following the instructions in the release notes I installed aptitude.
> Then the following:
> 
> # aptitude update
> Segmentation fault
> 
> 
> In fact, any invocation of "aptitude" causes a segfault.  The strace is
> similar, though not identical, to the one in #305877.
> 
> zaphod:~# strace aptitude
> _llseek(0x3, 0xffffffff, 0xfffff6a9, 0xfaf00f08, 0x1) = 0
> --- SIGSEGV (Segmentation fault) ---
> +++ killed by SIGSEGV +++

Yes, this is a general bug with woody g++ on hppa: it does not handle
exceptions correctly (Aptitude is written in C++).

To catter for that problem, Frans Pop has changed the release notes for
hppa to the following:

----------------------
4.5.1 Updating the package list

First the list of available packages for the new release needs to be fetched. This is done by executing[2]:

     # apt-get update

4.5.2 Upgrading aptitude

Upgrade tests have shown that sarge's version of aptitude is better at solving the complex dependencies during an upgrade than either apt-get or woody's aptitude. It should therefore be installed first using:

     # apt-get install aptitude

aptitude will show you a list of the changes that will be made and ask you to confirm them. You should take a careful look at the proposed changes, especially packages that will be removed by the upgrade, before you confirm. 
----------------------

so I am closing this bug.

Thanks a lot to have raised that issue!
-- 
Bill. <ballombe@debian.org>

Imagine a large red swirl here. 



Reply to: