ALT Linux Girar Builder robot reports
 help / color / mirror / Atom feed
From: "Girar awaiter (iv)" <girar-builder@altlinux.org>
To: Ivan Melnikov <iv@altlinux.org>
Cc: sisyphus-incominger@lists.altlinux.org,
	girar-builder-sisyphus@altlinux.org
Subject: [#335308] [test-only] FAILED rpm-macros-valgrind-checkinstall.git=1.0-alt2
Date: Tue, 28 Nov 2023 09:46:14 +0000
Message-ID: <girar.task.335308.1.1@gyle.mskdc.altlinux.org> (raw)

https://git.altlinux.org/tasks/335308/logs/events.1.1.log

subtask  name                              aarch64  armh  i586  ppc64le  x86_64
   #100  rpm-macros-valgrind-checkinstall       30    43    17       32      17

2023-Nov-28 09:42:52 :: test-only task #335308 for sisyphus started by iv:
#100 build 1.0-alt2 from /people/iv/packages/rpm-macros-valgrind-checkinstall.git fetched at 2023-Nov-28 09:42:51
2023-Nov-28 09:42:53 :: [x86_64] #100 rpm-macros-valgrind-checkinstall.git 1.0-alt2: build start
2023-Nov-28 09:42:53 :: [aarch64] #100 rpm-macros-valgrind-checkinstall.git 1.0-alt2: build start
2023-Nov-28 09:42:53 :: [armh] #100 rpm-macros-valgrind-checkinstall.git 1.0-alt2: build start
2023-Nov-28 09:42:53 :: [ppc64le] #100 rpm-macros-valgrind-checkinstall.git 1.0-alt2: build start
2023-Nov-28 09:42:53 :: [i586] #100 rpm-macros-valgrind-checkinstall.git 1.0-alt2: build start
2023-Nov-28 09:43:10 :: [i586] #100 rpm-macros-valgrind-checkinstall.git 1.0-alt2: build OK
2023-Nov-28 09:43:10 :: [x86_64] #100 rpm-macros-valgrind-checkinstall.git 1.0-alt2: build OK
2023-Nov-28 09:43:23 :: [aarch64] #100 rpm-macros-valgrind-checkinstall.git 1.0-alt2: build OK
2023-Nov-28 09:43:25 :: [ppc64le] #100 rpm-macros-valgrind-checkinstall.git 1.0-alt2: build OK
2023-Nov-28 09:43:36 :: [armh] #100 rpm-macros-valgrind-checkinstall.git 1.0-alt2: build OK
2023-Nov-28 09:43:45 :: #100: rpm-macros-valgrind-checkinstall.git 1.0-alt2: build check OK
2023-Nov-28 09:43:46 :: build check OK
2023-Nov-28 09:43:47 :: noarch check OK
2023-Nov-28 09:43:50 :: plan: src +1 -0 =18824, aarch64 +1 -0 =31676, armh +1 -0 =29563, i586 +1 -0 =31481, ppc64le +1 -0 =30968, x86_64 +1 -0 =32562
2023-Nov-28 09:44:36 :: patched apt indices
2023-Nov-28 09:44:50 :: created next repo
2023-Nov-28 09:45:00 :: duplicate provides check OK
2023-Nov-28 09:45:39 :: dependencies check OK
2023-Nov-28 09:45:40 :: [x86_64 i586 aarch64 ppc64le armh] ELF symbols check OK
2023-Nov-28 09:45:54 :: [i586] #100 rpm-macros-valgrind-checkinstall: install check OK
2023-Nov-28 09:45:54 :: [x86_64] #100 rpm-macros-valgrind-checkinstall: install check OK
2023-Nov-28 09:46:04 :: [aarch64] #100 rpm-macros-valgrind-checkinstall: install check OK
	ppc64le: rpm-macros-valgrind-checkinstall=1.0-alt2 install failed:
 <13>Nov 28 09:46:05 rpmi: rpm-macros-valgrind-checkinstall-1.0-alt2 sisyphus+335308.100.1.1 1701164603 installed
 ==4083352== Memcheck, a memory error detector
 ==4083352== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
 ==4083352== Using Valgrind-3.17.0 and LibVEX; rerun with -h for copyright info
 ==4083352== Command: /bin/echo
 ==4083352== 

 valgrind:  Fatal error at startup: a function redirection
 valgrind:  which is mandatory for this platform-tool combination
 valgrind:  cannot be set up.  Details of the redirection are:
 valgrind:  
 valgrind:  A must-be-redirected function
 valgrind:  whose name matches the pattern:      strlen
 valgrind:  in an object with soname matching:   ld64.so.2
 valgrind:  was not found whilst processing
 valgrind:  symbols from the object with soname: ld64.so.2
 valgrind:  
 valgrind:  Possible fixes: (1, short term): install glibc's debuginfo
 valgrind:  package on this machine.  (2, longer term): ask the packagers
 valgrind:  for your Linux distribution to please in future ship a non-
 valgrind:  stripped ld.so (or whatever the dynamic linker .so is called)
 valgrind:  that exports the above-named function using the standard
 valgrind:  calling conventions for this platform.  The package you need
 valgrind:  to install for fix (1) is called
 valgrind:  
 valgrind:    On Debian, Ubuntu:                 libc6-dbg
 valgrind:    On SuSE, openSuSE, Fedora, RHEL:   glibc-debuginfo
 valgrind:  
 valgrind:  Note that if you are debugging a 32 bit process on a
 valgrind:  64 bit system, you will need a corresponding 32 bit debuginfo
 valgrind:  package (e.g. libc6-dbg:i386).
 valgrind:  
 valgrind:  Cannot continue -- exiting now.  Sorry.

 error: %post(rpm-macros-valgrind-checkinstall-1.0-alt2.ppc64le) scriptlet failed, exit status 1
 error: rpm-macros-valgrind-checkinstall-1.0-alt2.ppc64le: install failed
 hsh-install: Packages installation failed.
2023-Nov-28 09:46:05 :: [ppc64le] #100 rpm-macros-valgrind-checkinstall: install check FAILED
2023-Nov-28 09:46:05 :: [ppc64le] requesting cancellation of task processing
	armh: rpm-macros-valgrind-checkinstall=1.0-alt2 install failed:
 <13>Nov 28 09:46:13 rpmi: rpm-macros-valgrind-checkinstall-1.0-alt2 sisyphus+335308.100.1.1 1701164613 installed
 ==2987115== Memcheck, a memory error detector
 ==2987115== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
 ==2987115== Using Valgrind-3.17.0 and LibVEX; rerun with -h for copyright info
 ==2987115== Command: /bin/echo
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x401080C: _dl_start (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83bc94 is on thread 1's stack
 ==2987115==  120 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x400B606: _dl_setup_hash (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83bc98 is on thread 1's stack
 ==2987115==  16 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x400FACC: _dl_sysdep_start (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83bb7c is on thread 1's stack
 ==2987115==  280 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x400CC3E: __GI___tunables_init (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83bb14 is on thread 1's stack
 ==2987115==  104 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x400B732: _dl_sort_maps_init (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83bb8c is on thread 1's stack
 ==2987115==  16 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x4014186: sbrk (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83bb80 is on thread 1's stack
 ==2987115==  16 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x4011050: dl_main (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83b97c is on thread 1's stack
 ==2987115==  512 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x4007F0C: _dl_new_object (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83b94c is on thread 1's stack
 ==2987115==  48 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x4007B72: __minimal_calloc (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83b950 is on thread 1's stack
 ==2987115==  16 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x4007AA2: __minimal_malloc (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83b948 is on thread 1's stack
 ==2987115==  24 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x4007E7E: _dl_add_to_namespace_list (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83b980 is on thread 1's stack
 ==2987115==  16 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x4004B34: _dl_init_paths (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83b944 is on thread 1's stack
 ==2987115==  56 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x400F21C: _dl_important_hwcaps (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83b8ec is on thread 1's stack
 ==2987115==  88 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x400F522: _dl_hwcaps_split_masked (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83b900 is on thread 1's stack
 ==2987115==  8 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x400F47A: _dl_hwcaps_split (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83b8e8 is on thread 1's stack
 ==2987115==  16 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x400F19C: copy_hwcaps (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83b8d0 is on thread 1's stack
 ==2987115==  40 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x40047D4: fillin_rpath.isra.0 (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83b8bc is on thread 1's stack
 ==2987115==  64 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x400F962: strsep (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83b8d0 is on thread 1's stack
 ==2987115==  8 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x4004712: expand_dynamic_string_token (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83b8b0 is on thread 1's stack
 ==2987115==  24 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x4004598: _dl_dst_count (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83b898 is on thread 1's stack
 ==2987115==  24 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x401631E: strdup (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83b8c0 is on thread 1's stack
 ==2987115==  16 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x4007BBE: __minimal_free (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83b8c0 is on thread 1's stack
 ==2987115==  16 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x400E290: _dl_audit_activity_map (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83b950 is on thread 1's stack
 ==2987115==  40 bytes below stack pointer
 ==2987115== 
 ==2987115== Invalid write of size 4
 ==2987115==    at 0x4010F9C: handle_preload_list (in /lib/ld-linux-armhf.so.3)
 ==2987115==  Address 0xfe83a97c is not stack'd, malloc'd or (recently) free'd
 ==2987115== 
 ==2987115== 
 ==2987115== Process terminating with default action of signal 11 (SIGSEGV)
 ==2987115==  Access not within mapped region at address 0xFE83A97C
 ==2987115==    at 0x4010F9C: handle_preload_list (in /lib/ld-linux-armhf.so.3)
 ==2987115==  If you believe this happened as a result of a stack
 ==2987115==  overflow in your program's main thread (unlikely but
 ==2987115==  possible), you can try to increase the size of the
 ==2987115==  main thread stack using the --main-stacksize= flag.
 ==2987115==  The main thread stack size used in this run was 8388608.
 ==2987115== 
 ==2987115== HEAP SUMMARY:
 ==2987115==     in use at exit: 0 bytes in 0 blocks
 ==2987115==   total heap usage: 0 allocs, 0 frees, 0 bytes allocated
 ==2987115== 
 ==2987115== All heap blocks were freed -- no leaks are possible
 ==2987115== 
 ==2987115== For lists of detected and suppressed errors, rerun with: -s
 ==2987115== ERROR SUMMARY: 57 errors from 24 contexts (suppressed: 0 from 0)
 /root/tmp/rpm-tmp.PFkcGL: line 2: 2987115 Segmentation fault      valgrind /bin/echo
 error: %post(rpm-macros-valgrind-checkinstall-1.0-alt2.armh) scriptlet failed, exit status 139
 error: rpm-macros-valgrind-checkinstall-1.0-alt2.armh: install failed
 hsh-install: Packages installation failed.
2023-Nov-28 09:46:13 :: [armh] #100 rpm-macros-valgrind-checkinstall: install check FAILED
2023-Nov-28 09:46:05 :: [ppc64le] install check FAILED
2023-Nov-28 09:46:14 :: [armh] install check FAILED
2023-Nov-28 09:46:14 :: task #335308 for sisyphus FAILED


                 reply	other threads:[~2023-11-28  9:46 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=girar.task.335308.1.1@gyle.mskdc.altlinux.org \
    --to=girar-builder@altlinux.org \
    --cc=devel@lists.altlinux.org \
    --cc=girar-builder-sisyphus@altlinux.org \
    --cc=iv@altlinux.org \
    --cc=sisyphus-incominger@lists.altlinux.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link

ALT Linux Girar Builder robot reports

This inbox may be cloned and mirrored by anyone:

	git clone --mirror http://lore.altlinux.org/sisyphus-incominger/0 sisyphus-incominger/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 sisyphus-incominger sisyphus-incominger/ http://lore.altlinux.org/sisyphus-incominger \
		sisyphus-incominger@lists.altlinux.org sisyphus-incominger@lists.altlinux.ru sisyphus-incominger@lists.altlinux.com
	public-inbox-index sisyphus-incominger

Example config snippet for mirrors.
Newsgroup available over NNTP:
	nntp://lore.altlinux.org/org.altlinux.lists.sisyphus-incominger


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git