Source: 3dldf
Version: 2.0.3+dfsg-7
Severity: serious
Tags: sid buster

Hi,

3dldf FTBFS on the above architectures with the error:
> ../src/3dldf tngnts_1.ldf
> GNU 3DLDF Version 2.0.3
> Copyright (C) 2013 The Free Software Foundation
> Author:  Laurence D. Finston
> 
> GNU 3DLDF comes with ABSOLUTELY NO WARRANTY;
> for details see the file COPYING,
> which you should have received in the distribution of GNU 3DLDF 2.0.3
> This is Free Software, and you are welcome to redistribute it under certain 
> conditions;
> for details, again, see the file COPYING.
> 
> Please send bug reports to laurence.fins...@gmx.de
> Web site:  http://www.gnu.org/software/3dldf/LDF.html
> 
> make[4]: *** [Makefile_sub:21: tngnts_1.mp] Segmentation fault

While it didn't fail on amd64, running 3dldf in valgrind (on amd64)
immediately crashes so this is probably not an architecture specific error:
> $ valgrind ../src/3dldf tngnts_1.ldf 
> ==29155== Memcheck, a memory error detector
> ==29155== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
> ==29155== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info
> ==29155== Command: ../src/3dldf tngnts_1.ldf
> ==29155== 
> GNU 3DLDF Version 2.0.3
> Copyright (C) 2013 The Free Software Foundation
> Author:  Laurence D. Finston
> 
> GNU 3DLDF comes with ABSOLUTELY NO WARRANTY;
> for details see the file COPYING,
> which you should have received in the distribution of GNU 3DLDF 2.0.3
> This is Free Software, and you are welcome to redistribute it under certain 
> conditions;
> for details, again, see the file COPYING.
> 
> Please send bug reports to laurence.fins...@gmx.de
> Web site:  http://www.gnu.org/software/3dldf/LDF.html
> 
> ==29155== Conditional jump or move depends on uninitialised value(s)
> ==29155==    at 0x2A61E9: Id_Map_Entry_Type::operator*=(Transform const&) 
> (imetfncs.web:3854)
> ==29155==    by 0x13E602: yyparse(void*) (parser.y++:29090)
> ==29155==    by 0x134F5C: main (main.web:1478)
> ==29155== 
> ==29155== Invalid read of size 1
> ==29155==    at 0x2A6398: Id_Map_Entry_Type::operator*=(Transform const&) 
> (imetfncs.web:3864)
> ==29155==    by 0x13E602: yyparse(void*) (parser.y++:29090)
> ==29155==    by 0x134F5C: main (main.web:1478)
> ==29155==  Address 0x0 is not stack'd, malloc'd or (recently) free'd
> ==29155== 
> ==29155== 
> ==29155== Process terminating with default action of signal 11 (SIGSEGV): 
> dumping core
> ==29155==  Access not within mapped region at address 0x0
> ==29155==    at 0x2A6398: Id_Map_Entry_Type::operator*=(Transform const&) 
> (imetfncs.web:3864)
> ==29155==    by 0x13E602: yyparse(void*) (parser.y++:29090)
> ==29155==    by 0x134F5C: main (main.web:1478)
> ==29155==  If you believe this happened as a result of a stack
> ==29155==  overflow in your program's main thread (unlikely but
> ==29155==  possible), you can try to increase the size of the
> ==29155==  main thread stack using the --main-stacksize= flag.
> ==29155==  The main thread stack size used in this run was 8388608.
> ==29155== 
> ==29155== HEAP SUMMARY:
> ==29155==     in use at exit: 1,207,653 bytes in 21,398 blocks
> ==29155==   total heap usage: 82,187 allocs, 60,789 frees, 2,678,604 bytes 
> allocated
> ==29155== 
> ==29155== LEAK SUMMARY:
> ==29155==    definitely lost: 56,200 bytes in 150 blocks
> ==29155==    indirectly lost: 309,868 bytes in 7,324 blocks
> ==29155==      possibly lost: 0 bytes in 0 blocks
> ==29155==    still reachable: 841,585 bytes in 13,924 blocks
> ==29155==         suppressed: 0 bytes in 0 blocks
> ==29155== Rerun with --leak-check=full to see details of leaked memory
> ==29155== 
> ==29155== For counts of detected and suppressed errors, rerun with: -v
> ==29155== Use --track-origins=yes to see where uninitialised values come from
> ==29155== ERROR SUMMARY: 2 errors from 2 contexts (suppressed: 0 from 0)
> Segmentation fault

Thanks,
James

Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to