Your message dated Thu, 19 Jan 2006 01:52:28 -0200 with message-id <[EMAIL PROTECTED]> has caused the Debian Bug report #348618, regarding [Fwd: Log for successful build of lifelines_3.0.50-1 (dist=unstable)] to be marked as having been forwarded to the upstream software author(s) [EMAIL PROTECTED]
(NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) --------------------------------------- Received: (at 348618-forwarded) by bugs.debian.org; 19 Jan 2006 03:44:39 +0000 >From [EMAIL PROTECTED] Wed Jan 18 19:44:39 2006 Return-path: <[EMAIL PROTECTED]> Received: from tinc.cathedrallabs.org ([72.9.252.66]) by spohr.debian.org with esmtp (Exim 4.50) id 1EzQj0-0002fy-W7 for [EMAIL PROTECTED]; Wed, 18 Jan 2006 19:44:39 -0800 Received: by tinc.cathedrallabs.org (Postfix, from userid 1006) id D5C1F104CA; Wed, 18 Jan 2006 22:44:37 -0500 (EST) Received: from [172.32.32.34] (unknown [201.14.22.98]) (using SSLv3 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by tinc.cathedrallabs.org (Postfix) with ESMTP id 0D917104C7; Wed, 18 Jan 2006 22:44:35 -0500 (EST) Message-ID: <[EMAIL PROTECTED]> Date: Thu, 19 Jan 2006 01:52:28 -0200 From: "Felipe Augusto van de Wiel (faw)" <[EMAIL PROTECTED]> Reply-To: [EMAIL PROTECTED] User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.12) Gecko/20051007 Debian/1.7.12-1 X-Accept-Language: en MIME-Version: 1.0 To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: [PATCH] Avoid segfault in arches such as ia64 X-Enigmail-Version: 0.93.0.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-7.0 required=4.0 tests=BAYES_00,HAS_PACKAGE, RCVD_IN_SORBS autolearn=no version=2.60-bugs.debian.org_2005_01_02 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi people, :o) I hope that you still remember me, I'm co-maintaining lifelines packages in Debian with Christian Perrier. This week we uploaded the new version (3.0.50) and we received a message from one of our "porters" with a patch (full message attached, I just edited it to add some "markers" to where you can find the patch). Debian builds its packages in 12+ architectures and we use a build network to test our packages, "dann frazier" sent a patch to avoid that our package "segfault on architectures where the size of a pointer is greater than the size of an integer, such as ia64". dann was not sure about "where" he should apply the patch, so he added the prototype in codesets.c. Right now, I prepared a new version of the package (3.0.50-2) with a patch to fix this problem, but I would like to ask you to include this patch in the upstream source code. :) Kind regards, PS: Could you please keep [EMAIL PROTECTED] (already set in reply-to: field) cc:ed on all messages about this thread. It is the "bug address" in our bug tracking system and we can keep a log about our decisions on this subject. - -------- Original Message -------- Subject: Bug#348618: [Fwd: Log for successful build of lifelines_3.0.50-1 (dist=unstable)] Resent-Date: Wed, 18 Jan 2006 02:33:08 UTC, Tue, 17 Jan 2006 18:33:10 -0800 Resent-From: dann frazier <[EMAIL PROTECTED]> Resent-To: debian-bugs-dist@lists.debian.org Resent-CC: Felipe Augusto van de Wiel (faw) <[EMAIL PROTECTED]> Date: Tue, 17 Jan 2006 19:21:47 -0700 From: dann frazier <[EMAIL PROTECTED]> Reply-To: dann frazier <[EMAIL PROTECTED]>, [EMAIL PROTECTED] To: [EMAIL PROTECTED] CC: David Mosberger <[EMAIL PROTECTED]> Package: lifelines Version: 3.0.50-1 Tags: patch Severity: important Our automated buildd log filter[1] detected a problem that will cause your package to segfault on architectures where the size of a pointer is greater than the size of an integer, such as ia64. There was no obvious header file for me to stick this prototype in, so this patch just puts it in the .c file. [1]http://people.debian.org/~dannf/check-implicit-pointer-functions - -----8<---------------------------------------------------------8<---------------------------- - --- lifelines-3.0.50.orig/src/gedlib/codesets.c 2005-10-07 15:47:15.000000000 -0600 +++ lifelines-3.0.50/src/gedlib/codesets.c 2006-01-17 19:18:49.000000000 -0700 @@ -52,6 +52,7 @@ *********************************************/ /* alphabetical */ +char *norm_charmap(char *name); static void set_codeset_pair(CNSTRING base, CNSTRING defval, STRING *pcsout, STRING *pcsin); /********************************************* - ----->8--------------------------------------------------------->8---------------------------- <original buildd message> Subject: Log for successful build of lifelines_3.0.50-1 (dist=unstable) From: Debian/IA64 non-US Build Daemon <[EMAIL PROTECTED]> Date: Tue, 17 Jan 2006 19:27:09 +0000 To: undisclosed-recipients: ; Function `norm_charmap' implicitly converted to pointer at codesets.c:90 </original buildd message> - -- Felipe Augusto van de Wiel (faw) "Debian. Freedom to code. Code to freedom!" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) Comment: Using GnuPG with Debian - http://enigmail.mozdev.org iD8DBQFDzwz8CjAO0JDlykYRAtInAKC74P1+DmNSsKjNQk92QuuP3aUJMACgkOEV 2bDms6mF5Wcnn3J7Zyg3n2k= =LuSP -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]