Your message dated Wed, 20 Sep 2006 14:32:38 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#388000: fixed in cln 1.1.13-2
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: cln
Severity: important
Tags: patch
Hi,
I checked the compile failure and it seems to be an assembler problem,
but the constructor/desctructor hack is not completely blameless.
It seems the assembler doesn't know how to generate the GOT entry for
the duplicated jump destination.
Luckily the problem is easily avoidable by using a pc relative jump as
done in the attached patch.
bye, Roman
-- System Information:
Debian Release: testing/unstable
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: m68k
Shell: /bin/sh linked to /bin/dash
Kernel: Linux 2.4.30
Locale: LANG=de_DE.UTF-8, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
diff -ur cln-1.1.13.old/include/cln/modules.h cln-1.1.13/include/cln/modules.h
--- cln-1.1.13.old/include/cln/modules.h 2006-05-07 22:51:58.000000000
+0200
+++ cln-1.1.13/include/cln/modules.h 2006-09-16 14:56:05.000000000 +0200
@@ -136,7 +136,7 @@
#define CL_JUMP_TO(addr) ASM_VOLATILE("jmp " ASM_UNDERSCORE_PREFIX #addr)
#endif
#if defined(__m68k__)
- #define CL_JUMP_TO(addr) ASM_VOLATILE("jmp %0@" : : "a" ((void*)(addr)))
+ #define CL_JUMP_TO(addr) ASM_VOLATILE("jmp (" ASM_UNDERSCORE_PREFIX #addr
",%pc)")
#endif
#if defined(__mips__) || defined(__mipsel__)
//#define CL_JUMP_TO(addr) ASM_VOLATILE("%*j %0" : : "d" ((void*)(addr)))
--- End Message ---
--- Begin Message ---
Source: cln
Source-Version: 1.1.13-2
We believe that the bug you reported is fixed in the latest version of
cln, which is due to be installed in the Debian FTP archive:
cln_1.1.13-2.diff.gz
to pool/main/c/cln/cln_1.1.13-2.diff.gz
cln_1.1.13-2.dsc
to pool/main/c/cln/cln_1.1.13-2.dsc
libcln-dev_1.1.13-2_i386.deb
to pool/main/c/cln/libcln-dev_1.1.13-2_i386.deb
libcln4_1.1.13-2_i386.deb
to pool/main/c/cln/libcln4_1.1.13-2_i386.deb
pi_1.1.13-2_i386.deb
to pool/main/c/cln/pi_1.1.13-2_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Richard Kreckel <[EMAIL PROTECTED]> (supplier of updated cln package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 20 Sep 2006 22:53:21 +0200
Source: cln
Binary: libcln4 pi libcln-dev
Architecture: source i386
Version: 1.1.13-2
Distribution: unstable
Urgency: low
Maintainer: Richard Kreckel <[EMAIL PROTECTED]>
Changed-By: Richard Kreckel <[EMAIL PROTECTED]>
Description:
libcln-dev - Development library for Class Library for Numbers (c++)
libcln4 - Class Library for Numbers (C++)
pi - Compute Archimedes' constant Pi to arbitrary precision
Closes: 388000
Changes:
cln (1.1.13-2) unstable; urgency=low
.
* Apply workaround for m68k build failure; closes: #388000.
Files:
405590de10037844badcc42eae454829 583 - optional cln_1.1.13-2.dsc
b0d2cf5d8c217c71f3e9c1b8a76bf55f 5521 - optional cln_1.1.13-2.diff.gz
b5ef281109dad8319ad0545afbfb07d4 423846 libs optional libcln4_1.1.13-2_i386.deb
d5c7b94690cf8fc34984d373e1b459fb 897566 libdevel optional
libcln-dev_1.1.13-2_i386.deb
7b6a5136e3643135ebbc6883396cdb32 7790 math optional pi_1.1.13-2_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
iD8DBQFFEa7RXY7lDPAZkWIRAhtzAJ0TAqRSGoGTYnEEKe53Ln2fVhaO9QCffxPp
A/loPO3DX+RFR5uB3b1zDV0=
=GgU5
-----END PGP SIGNATURE-----
--- End Message ---